815,000 records claimed
Adidas, a global leader in sportswear, has confirmed it is investigating a security incident involving one of its third-party partners. The partner, identified as a licensed distributor for Adidas-branded martial arts gear, reportedly suffered a data breach. The incident came to light after a threat actor, claiming association with the Lapsus$ hacking collective, posted on BreachForums on February 16, 2026, boasting of the compromise. The actor alleged the exfiltration of 815,000 rows of data from the Adidas extranet, including user PII and technical information. While Adidas asserts that its primary systems are secure, this event serves as a critical example of a supply chain attack, where a less secure partner can become a gateway into a larger organization's ecosystem.
The incident appears to be a classic supply chain attack targeting a trusted partner to gain access to a larger entity's resources. The partner, identified by Cybernews as Double D, operates its own IT systems but has access to an Adidas extranet for business purposes.
A threat actor using the moniker "LAPSUS-GROUP" claimed to have compromised this extranet. The actor's claims include:
The threat actor's alias and TTPs are reminiscent of the original Lapsus$ group, known for its expertise in social engineering, SIM swapping, and targeting third-party contractors and help desks to gain initial access.
While specific technical details of the breach are not yet public, we can infer the likely attack path based on the claimed affiliation with Lapsus$ and the nature of the target.
T1566 - Phishing or social engineering targeting an employee of the third-party partner to steal their credentials for the Adidas extranet.T1078 - Valid Accounts. This could also involve SIM swapping to intercept MFA codes if they were in use.T1213 - Data from Information Repositories by scraping or exporting all accessible data.T1078.004 - Cloud Accounts.The statement "something bigger is coming" from the threat actor is a common tactic to create fear, uncertainty, and doubt (FUD) and may indicate they are attempting to extort Adidas or that they have deeper access than currently known.
While not directly scanning, a robust vendor risk management program should assess the security posture of third-party partners.
Enforce the principle of least privilege for partner accounts, ensuring they can only access data essential for their business function.
Mandating strong MFA for all partner accounts accessing corporate resources can prevent credential-based takeovers.
A threat actor 'LAPSUS-GROUP' posts on BreachForums claiming to have compromised the Adidas extranet.
Adidas publicly confirms it is investigating a security incident at a third-party partner.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.