Adidas Investigates Third-Party Data Breach After Lapsus$ Claims 815k Record Theft

Adidas Probes Supply Chain Breach at Partner Firm; Lapsus$ Affiliate Claims Responsibility

MEDIUM
February 19, 2026
5m read
Supply Chain AttackData BreachThreat Actor

Impact Scope

People Affected

815,000 records claimed

Affected Companies

Adidas

Industries Affected

RetailManufacturing

Related Entities

Threat Actors

Lapsus$ Group

Other

Adidas Double DBreachForums

Full Report

Executive Summary

Adidas, a global leader in sportswear, has confirmed it is investigating a security incident involving one of its third-party partners. The partner, identified as a licensed distributor for Adidas-branded martial arts gear, reportedly suffered a data breach. The incident came to light after a threat actor, claiming association with the Lapsus$ hacking collective, posted on BreachForums on February 16, 2026, boasting of the compromise. The actor alleged the exfiltration of 815,000 rows of data from the Adidas extranet, including user PII and technical information. While Adidas asserts that its primary systems are secure, this event serves as a critical example of a supply chain attack, where a less secure partner can become a gateway into a larger organization's ecosystem.


Threat Overview

The incident appears to be a classic supply chain attack targeting a trusted partner to gain access to a larger entity's resources. The partner, identified by Cybernews as Double D, operates its own IT systems but has access to an Adidas extranet for business purposes.

A threat actor using the moniker "LAPSUS-GROUP" claimed to have compromised this extranet. The actor's claims include:

  • Exfiltration of 815,000 data rows.
  • Compromised data includes: first and last names, email addresses, passwords, dates of birth, company names, and technical data.
  • A separate claim of possessing 420GB of data related to the French market.

The threat actor's alias and TTPs are reminiscent of the original Lapsus$ group, known for its expertise in social engineering, SIM swapping, and targeting third-party contractors and help desks to gain initial access.

Technical Analysis

While specific technical details of the breach are not yet public, we can infer the likely attack path based on the claimed affiliation with Lapsus$ and the nature of the target.

  • Initial Access: Lapsus$ traditionally favors non-technical means. The breach likely started with T1566 - Phishing or social engineering targeting an employee of the third-party partner to steal their credentials for the Adidas extranet.
  • Credential Access: The goal would be to obtain valid login credentials, falling under T1078 - Valid Accounts. This could also involve SIM swapping to intercept MFA codes if they were in use.
  • Collection: Once logged into the extranet, the attacker would have performed T1213 - Data from Information Repositories by scraping or exporting all accessible data.
  • Defense Evasion: The use of a legitimate partner account would make the malicious activity difficult to distinguish from normal business operations, a form of T1078.004 - Cloud Accounts.

The statement "something bigger is coming" from the threat actor is a common tactic to create fear, uncertainty, and doubt (FUD) and may indicate they are attempting to extort Adidas or that they have deeper access than currently known.

Impact Assessment

  • Supply Chain Risk Realized: This incident is a textbook example of supply chain risk. Adidas's direct security may be robust, but a vulnerability in a single trusted partner exposed its ecosystem to a breach.
  • Data Exposure: If the actor's claims are true, the PII of 815,000 individuals (likely business partners, employees, and potentially customers of the martial arts division) is now in the hands of criminals, posing a risk of phishing and identity theft.
  • Reputational Damage: Although Adidas has tried to distance itself by clarifying it was a partner breach, the Adidas brand is still associated with the incident, which can erode consumer and partner trust.
  • Operational Disruption: Adidas must now spend significant resources on the investigation, reviewing the security of all its third-party partners, and managing the fallout from the breach.

Cyber Observables for Detection

Type Value Description Context Confidence
user_account_pattern Extranet login from an anomalous IP or location A partner account logging into the extranet from a new or suspicious geographic location or IP address. Web server logs, SIEM, IAM logs high
network_traffic_pattern Bulk data download from extranet A single partner account downloading an unusually large volume of data, far exceeding normal business activity. Application logs, network flow logs, DLP systems high
api_endpoint Rapid, repeated API calls for data enumeration An attacker scripting the enumeration and exfiltration of data via the extranet's API. API gateway logs, WAF logs medium

Detection & Response

  1. Third-Party Monitoring: Organizations must extend their security monitoring to partner-facing systems like extranets. Implement UEBA to detect anomalous behavior from partner accounts, such as unusual login times, locations, or excessive data access.
  2. Extranet Log Analysis: Ingest and analyze logs from the Adidas extranet into a central SIEM. Create alerts for bulk data downloads or when a single account accesses a high percentage of the total available records.
  3. Threat Intelligence: Monitor dark web forums and threat intelligence feeds for mentions of your brand, partners, or executives. This can provide an early warning of a breach, as it did in this case.

Mitigation

  1. Vendor Risk Management (VRM): Establish a robust VRM program that includes mandatory security assessments for all third-party partners. The level of assessment should be proportional to the level of access and data they handle.
  2. Principle of Least Privilege: Enforce the principle of least privilege for all partner accounts on extranets and shared systems. Partners should only have access to the specific data and functions absolutely necessary for their role. This is a form of D3-UAP: User Account Permissions.
  3. Strong Authentication: Mandate strong, phishing-resistant MFA for all partner accounts accessing corporate resources. This aligns with D3-MFA: Multi-factor Authentication.
  4. Contractual Obligations: Ensure that contracts with third-party partners include clear cybersecurity requirements, liability clauses, and the right to audit their security controls.

Timeline of Events

1
February 16, 2026
A threat actor 'LAPSUS-GROUP' posts on BreachForums claiming to have compromised the Adidas extranet.
2
February 18, 2026
Adidas publicly confirms it is investigating a security incident at a third-party partner.
3
February 19, 2026
This article was published

MITRE ATT&CK Mitigations

While not directly scanning, a robust vendor risk management program should assess the security posture of third-party partners.

Enforce the principle of least privilege for partner accounts, ensuring they can only access data essential for their business function.

Mandating strong MFA for all partner accounts accessing corporate resources can prevent credential-based takeovers.

Audit

M1047enterprise

Continuously audit and monitor the activity of partner accounts for anomalous behavior like bulk data downloads.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

supply chain attackdata breachAdidasLapsus$third-party riskextranet

📢 Share This Article

Help others stay informed about cybersecurity threats