815,000 records claimed
Adidas, a global leader in sportswear, has confirmed it is investigating a security incident involving one of its third-party partners. The partner, identified as a licensed distributor for Adidas-branded martial arts gear, reportedly suffered a data breach. The incident came to light after a threat actor, claiming association with the Lapsus$ hacking collective, posted on BreachForums on February 16, 2026, boasting of the compromise. The actor alleged the exfiltration of 815,000 rows of data from the Adidas extranet, including user PII and technical information. While Adidas asserts that its primary systems are secure, this event serves as a critical example of a supply chain attack, where a less secure partner can become a gateway into a larger organization's ecosystem.
The incident appears to be a classic supply chain attack targeting a trusted partner to gain access to a larger entity's resources. The partner, identified by Cybernews as Double D, operates its own IT systems but has access to an Adidas extranet for business purposes.
A threat actor using the moniker "LAPSUS-GROUP" claimed to have compromised this extranet. The actor's claims include:
The threat actor's alias and TTPs are reminiscent of the original Lapsus$ group, known for its expertise in social engineering, SIM swapping, and targeting third-party contractors and help desks to gain initial access.
While specific technical details of the breach are not yet public, we can infer the likely attack path based on the claimed affiliation with Lapsus$ and the nature of the target.
T1566 - Phishing or social engineering targeting an employee of the third-party partner to steal their credentials for the Adidas extranet.T1078 - Valid Accounts. This could also involve SIM swapping to intercept MFA codes if they were in use.T1213 - Data from Information Repositories by scraping or exporting all accessible data.T1078.004 - Cloud Accounts.The statement "something bigger is coming" from the threat actor is a common tactic to create fear, uncertainty, and doubt (FUD) and may indicate they are attempting to extort Adidas or that they have deeper access than currently known.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| user_account_pattern | Extranet login from an anomalous IP or location | A partner account logging into the extranet from a new or suspicious geographic location or IP address. | Web server logs, SIEM, IAM logs | high |
| network_traffic_pattern | Bulk data download from extranet | A single partner account downloading an unusually large volume of data, far exceeding normal business activity. | Application logs, network flow logs, DLP systems | high |
| api_endpoint | Rapid, repeated API calls for data enumeration | An attacker scripting the enumeration and exfiltration of data via the extranet's API. | API gateway logs, WAF logs | medium |
While not directly scanning, a robust vendor risk management program should assess the security posture of third-party partners.
Enforce the principle of least privilege for partner accounts, ensuring they can only access data essential for their business function.
Mandating strong MFA for all partner accounts accessing corporate resources can prevent credential-based takeovers.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats