Sportswear giant Nike Inc. is facing a proposed class-action lawsuit following a data breach that occurred on a third-party portal. The company discovered the unauthorized access on January 21, 2026, but reportedly waited a month before beginning to notify affected customers. The lawsuit, filed in the US District Court for the District of Oregon, alleges that Nike was negligent in protecting consumer data and failed in its duty to provide timely notification. The complaint cites violations of the Federal Trade Commission Act and seeks to establish a class of affected individuals for damages.
Details about the breach are still emerging, but the core facts from the lawsuit are:
The lawsuit does not specify the nature of the data compromised or the number of individuals affected. However, the legal action centers on two main allegations:
The lawsuit highlights several legal and regulatory frameworks that govern data protection and breach notification:
For organizations managing customer data, this incident serves as a reminder of key security and compliance principles:
Enforcing MFA on third-party portals can prevent unauthorized access via compromised credentials.
Nike discovers unauthorized access to a third-party portal.
Nike reportedly begins notifying affected customers, approximately one month after discovery.
A class-action lawsuit is filed against Nike in Oregon.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.