{
	"id": "7f7dbe85-dfcd-44c3-8149-eef44716b131",
	"created_at": "2026-04-06T00:20:05.702544Z",
	"updated_at": "2026-04-10T03:22:08.31113Z",
	"deleted_at": null,
	"sha1_hash": "3d70173d54a583176a0c8e4f4f52da2260652a5e",
	"title": "Threats Claimimg Breach of Decathlon May 2024 Database",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 326182,
	"plain_text": "Threats Claimimg Breach of Decathlon May 2024 Database\r\nBy Dhivya\r\nPublished: 2024-05-28 · Archived: 2026-04-05 13:04:22 UTC\r\nIt has been reported that a well-known threat actor named “888” has allegedly exposed a database linked to the\r\npopular sporting goods store Decathlon.\r\nThe claim was made public through a tweet by DarkWebInformer, suggesting that some data has been exposed.\r\nUpdate From Decathlon: “On May 27, 2024, our cybersecurity teams in Spain became aware that data\r\ncontaining email addresses belonging to employees of Decathlon Spain was allegedly being offered for sale\r\nonline.Upon initial analysis, it has been confirmed that this data originated from a third-party application and that\r\nonly emails of Spanish employees are concerned. No passwords or other data appear to be included in the set. We\r\ncan also confirm that no customer data was impacted. We are committed to ensuring the privacy and security of all\r\nour employees.”\r\nANYRUN malware sandbox’s 8thBirthday Special Offer: Grab 6 Months of Free Service\r\nCybersecurity experts have weighed in on the situation, emphasizing the importance of robust security measures\r\nfor large retailers.\r\nDecathlon could face significant legal and financial repercussions if the breach is confirmed.\r\nhttps://cybersecuritynews.com/threats-claimimg-breach/\r\nPage 1 of 2\n\nThis includes:\r\nChanging passwords for their Decathlon accounts and any other accounts using the same password.\r\nMonitoring bank and credit card statements for any unauthorized transactions.\r\nBe cautious of phishing emails or messages attempting to exploit the situation.\r\nAs the situation develops, how Decathlon will respond to these serious allegations remains to be seen.\r\nThe company must conduct a thorough investigation to determine the extent of the breach and implement\r\nmeasures to prevent future incidents.\r\nFree Webinar onLive API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers\r\nSource: https://cybersecuritynews.com/threats-claimimg-breach/\r\nhttps://cybersecuritynews.com/threats-claimimg-breach/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MISPGALAXY",
		"Malpedia"
	],
	"references": [
		"https://cybersecuritynews.com/threats-claimimg-breach/"
	],
	"report_names": [
		"threats-claimimg-breach"
	],
	"threat_actors": [],
	"ts_created_at": 1775434805,
	"ts_updated_at": 1775791328,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/3d70173d54a583176a0c8e4f4f52da2260652a5e.pdf",
		"text": "https://archive.orkl.eu/3d70173d54a583176a0c8e4f4f52da2260652a5e.txt",
		"img": "https://archive.orkl.eu/3d70173d54a583176a0c8e4f4f52da2260652a5e.jpg"
	}
}