{
	"id": "bfbf1fb6-6c79-4cd6-be2d-2ca070bb8094",
	"created_at": "2026-04-06T00:21:32.005602Z",
	"updated_at": "2026-04-10T13:11:51.483207Z",
	"deleted_at": null,
	"sha1_hash": "5249b32c1cecd7f7331068a37eb0d77877f24811",
	"title": "Adidas Data Breach Linked to Third-Party Vendor",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 96857,
	"plain_text": "Adidas Data Breach Linked to Third-Party Vendor\r\nBy Ionut Arghire\r\nPublished: 2025-05-29 · Archived: 2026-04-05 12:49:40 UTC\r\nSneaker and sportswear giant Adidas disclosed a data breach this week after hackers accessed a “third-party customer service provider” and stole the contact information of customers who contacted the help\r\ndesk in the past.\r\n“We immediately took steps to contain the incident and launched a comprehensive investigation, collaborating\r\nwith leading information security experts. The affected data does not contain passwords, credit card or any other\r\npayment-related information,” the company said.\r\nThe Herzogenaurach, Germany-based company said it was in the process of notifying the potentially affected\r\ncustomers and the relevant authorities, but has not shared details on the number of potentially affected individuals\r\nor on how the hack occurred.\r\nLingerie retailer Victoria’s Secret was also impacted by a cyber incident this week that forced it to take its website\r\ndown on Wednesday. The site remains offline at the time of publication.\r\nThe two incidents came to light only weeks after UK retailers Co-op, Harrods, and Marks \u0026 Spencer (M\u0026S) were\r\ntargeted by the DragonForce ransomware group. The attack on M\u0026S resulted in data theft and could cost the\r\nretailer roughly $400 million.\r\n“Retailers have become high-value targets for cybercriminals, and recent breaches at Dior, M\u0026S, Harrods, and\r\nCo-Op in the last month alone make it clear that this is more than just a passing trend,” said Ryan Sherstobitoff,\r\nSVP of Threat Research \u0026 Intelligence at SecurityScorecard. “These attacks are not isolated events; they represent\r\na growing pattern exposing a deeper, systematic vulnerability within the retail industry. In this Adidas breach,\r\nattackers accessed data through a third-party provider, highlighting the threat of interconnected supply chains,\r\nwhich continue to be a major entryway for threat actors.” \r\nAdvertisement. Scroll to continue reading.\r\nhttps://www.securityweek.com/adidas-data-breach-linked-to-third-party-vendor/\r\nPage 1 of 2\n\n“While Adidas has claimed that the stolen data from this breach excludes any payment-related information, the\r\ndata still remains highly valuable for threat actors to exploit for identity theft, phishing themes, and other\r\nfraudulent activities,” Sherstobitoff added.\r\nRelated: Google Warns UK Retailer Hackers Now Targeting US\r\nSource: https://www.securityweek.com/adidas-data-breach-linked-to-third-party-vendor/\r\nhttps://www.securityweek.com/adidas-data-breach-linked-to-third-party-vendor/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.securityweek.com/adidas-data-breach-linked-to-third-party-vendor/"
	],
	"report_names": [
		"adidas-data-breach-linked-to-third-party-vendor"
	],
	"threat_actors": [
		{
			"id": "6608b798-f92b-42af-a93f-d72800eeb3a3",
			"created_at": "2023-11-30T02:00:07.292Z",
			"updated_at": "2026-04-10T02:00:03.482199Z",
			"deleted_at": null,
			"main_name": "DragonForce",
			"aliases": [],
			"source_name": "MISPGALAXY:DragonForce",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "843f4240-33a7-4de4-8dcf-4ff9f9a8c758",
			"created_at": "2025-07-24T02:05:00.538379Z",
			"updated_at": "2026-04-10T02:00:03.657424Z",
			"deleted_at": null,
			"main_name": "GOLD FLAME",
			"aliases": [
				"DragonForce"
			],
			"source_name": "Secureworks:GOLD FLAME",
			"tools": [
				"ADFind",
				"AnyDesk",
				"Cobalt Strike",
				"FileSeek",
				"Mimikatz",
				"SoftPerfect Network Scanner",
				"SystemBC",
				"socks.exe"
			],
			"source_id": "Secureworks",
			"reports": null
		}
	],
	"ts_created_at": 1775434892,
	"ts_updated_at": 1775826711,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/5249b32c1cecd7f7331068a37eb0d77877f24811.pdf",
		"text": "https://archive.orkl.eu/5249b32c1cecd7f7331068a37eb0d77877f24811.txt",
		"img": "https://archive.orkl.eu/5249b32c1cecd7f7331068a37eb0d77877f24811.jpg"
	}
}