Sats data leaked on darknet after hacker attack

Gym chain Sats has confirmed a data breach affecting employees and members after a mid-March cyberattack. Sensitive HR data and member information have surfaced on the darknet, according to IT expert Karl Emil Nikka. The company is still investigating the full scope.

Gym chain Sats faced a hacker attack in mid-March. Initially deemed limited, the breach later appeared more extensive. On Wednesday, Sats reported that hackers accessed an internal shared storage server mainly used for accounting. Documents there included member names, contact details, and for some, additional personal information. Employee personal data also leaked.

CEO Sondre Gravir expressed regret in a statement: “Att information om anställda och medlemmar har påverkats är olyckligt. Vi beklagar konsekvenserna av detta brott.” Nordic PR chief Kristin Fjeld said a group of employees is affected and will be contacted directly, but exact figures await confirmation from the investigation. The incident has been reported to police.

IT security specialist Karl Emil Nikka from SSF Stöldskyddsförening discovered on April 1 data on over 10,000 registered users on the darknet, including names, postal addresses, phone numbers, and member numbers. Sensitive HR information such as termination agreements and investigations involving staff also leaked. “Bland de anställda så har det läckt ut betydligt värre saker,” Nikka said.

The attack comes from a hacker group active since summer 2025, which extorts hundreds of organizations by threatening to publish stolen data unless paid. Sats urges reliance solely on official information as the investigation continues.

Articles connexes

Dramatic illustration of a darknet leak of Swedish government IT data by hackers, showing computer screens with source code, passwords, and personal files.
Image générée par IA

Swedish government IT data leaked on darknet

Rapporté par l'IA Image générée par IA

A hacker group called ByteToBreach has leaked sensitive information from a government IT system on the darknet. The leak includes source code, passwords, and personal data from a platform managed by IT consultant CGI Sweden. Authorities like Cert-SE confirm they are aware of the reports but decline to comment.

Personal information of about 4.5 million members of Seoul's public bike sharing service Ttareungyi is believed to have leaked in 2024, leading to a police investigation. The breach, suspected to be the work of hackers, is thought to have occurred around the time of widespread DDoS attacks on public institutions.

Rapporté par l'IA

A massive data breach at e-commerce giant Coupang exposed personal information of 33.7 million customers from June 24 to November 8. Officials revealed the attacker exploited the company's electronic signature key, prompting a thorough government investigation. The incident has heightened public concerns over South Korea's data protection capabilities.

Le site de divertissement pour adultes Frivol a révélé une fuite de données pouvant impacter environ 479 000 utilisateurs. La brèche impliquait une base de données ouverte contenant des détails d'utilisateurs. La révélation a été rapportée le 25 février 2026.

Rapporté par l'IA

Une violation de données importante a compromis les informations de cartes de crédit de plus de 5,6 millions d'individus. L'incident concerne 700Credit, où les données ont été volées via une intégration d'API tierce. Les détails ont émergé dans un rapport récent sur les menaces de cybersécurité.

Une massive violation de données en Chine a apparemment fait fuiter 8,7 milliards d'enregistrements après qu'une gigantesque base de données a été laissée déverrouillée sur Internet. L'incident, détaillé dans des rapports récents, met en lumière les vulnérabilités des pratiques de sécurité des données. Les autorités n'ont pas encore confirmé l'ampleur totale de l'exposition.

Rapporté par l'IA

A massive data breach at South Korea's leading e-commerce firm Coupang has exposed personal information of 33.7 million customers. Police are tracking a Chinese former employee suspect using an IP address, while the government considers fines up to 1 trillion won. The breach, starting in June, went undetected for five months.

 

 

 

Ce site utilise des cookies

Nous utilisons des cookies pour l'analyse afin d'améliorer notre site. Lisez notre politique de confidentialité pour plus d'informations.
Refuser