Sats data leaked on darknet after hacker attack

Gym chain Sats has confirmed a data breach affecting employees and members after a mid-March cyberattack. Sensitive HR data and member information have surfaced on the darknet, according to IT expert Karl Emil Nikka. The company is still investigating the full scope.

Gym chain Sats faced a hacker attack in mid-March. Initially deemed limited, the breach later appeared more extensive. On Wednesday, Sats reported that hackers accessed an internal shared storage server mainly used for accounting. Documents there included member names, contact details, and for some, additional personal information. Employee personal data also leaked.

CEO Sondre Gravir expressed regret in a statement: “Att information om anställda och medlemmar har påverkats är olyckligt. Vi beklagar konsekvenserna av detta brott.” Nordic PR chief Kristin Fjeld said a group of employees is affected and will be contacted directly, but exact figures await confirmation from the investigation. The incident has been reported to police.

IT security specialist Karl Emil Nikka from SSF Stöldskyddsförening discovered on April 1 data on over 10,000 registered users on the darknet, including names, postal addresses, phone numbers, and member numbers. Sensitive HR information such as termination agreements and investigations involving staff also leaked. “Bland de anställda så har det läckt ut betydligt värre saker,” Nikka said.

The attack comes from a hacker group active since summer 2025, which extorts hundreds of organizations by threatening to publish stolen data unless paid. Sats urges reliance solely on official information as the investigation continues.

Articles connexes

Dramatic illustration of a darknet leak of Swedish government IT data by hackers, showing computer screens with source code, passwords, and personal files.
Image générée par IA

Swedish government IT data leaked on darknet

Rapporté par l'IA Image générée par IA

A hacker group called ByteToBreach has leaked sensitive information from a government IT system on the darknet. The leak includes source code, passwords, and personal data from a platform managed by IT consultant CGI Sweden. Authorities like Cert-SE confirm they are aware of the reports but decline to comment.

A hacker known as Rootboy has begun daily data dumps from Standard Bank's systems on the dark web since 14 April, following the bank's refusal to pay a 1 Bitcoin ransom. The attack, which started on 27 February, exfiltrated 1.2TB of data from Standard Bank and Liberty. The bank has confirmed exposure of some credit card details but no CVV numbers.

Rapporté par l'IA

Inditex, the textile group behind Zara, disclosed on Wednesday night an unauthorized access to internal databases hosted on a third-party provider's servers. The company states no customer personal data, such as names, phones or credit cards, was compromised. Operations remain fully unaffected.

As the April 14 ransom deadline approaches, ShinyHunters has reiterated threats to release breached Rockstar Games data obtained via third-party Anodot, following the studio's confirmation of limited non-material access with no player impact. This updates coverage of the initial breach claim reported earlier this week.

Rapporté par l'IA

German police and Europol shut down around 373,000 to 400,000 darknet sites selling gross child abuse material and scams in Operation Alice. Five Swedish men are suspected of gross child pornography crimes following a tip from German police. 440 customers were identified in the five-year investigation.

Ce site utilise des cookies

Nous utilisons des cookies pour l'analyse afin d'améliorer notre site. Lisez notre politique de confidentialité pour plus d'informations.
Refuser