Sats data leaked on darknet after hacker attack

Gym chain Sats has confirmed a data breach affecting employees and members after a mid-March cyberattack. Sensitive HR data and member information have surfaced on the darknet, according to IT expert Karl Emil Nikka. The company is still investigating the full scope.

Gym chain Sats faced a hacker attack in mid-March. Initially deemed limited, the breach later appeared more extensive. On Wednesday, Sats reported that hackers accessed an internal shared storage server mainly used for accounting. Documents there included member names, contact details, and for some, additional personal information. Employee personal data also leaked.

CEO Sondre Gravir expressed regret in a statement: “Att information om anställda och medlemmar har påverkats är olyckligt. Vi beklagar konsekvenserna av detta brott.” Nordic PR chief Kristin Fjeld said a group of employees is affected and will be contacted directly, but exact figures await confirmation from the investigation. The incident has been reported to police.

IT security specialist Karl Emil Nikka from SSF Stöldskyddsförening discovered on April 1 data on over 10,000 registered users on the darknet, including names, postal addresses, phone numbers, and member numbers. Sensitive HR information such as termination agreements and investigations involving staff also leaked. “Bland de anställda så har det läckt ut betydligt värre saker,” Nikka said.

The attack comes from a hacker group active since summer 2025, which extorts hundreds of organizations by threatening to publish stolen data unless paid. Sats urges reliance solely on official information as the investigation continues.

Artikel Terkait

Dramatic illustration of a darknet leak of Swedish government IT data by hackers, showing computer screens with source code, passwords, and personal files.
Gambar dihasilkan oleh AI

Swedish government IT data leaked on darknet

Dilaporkan oleh AI Gambar dihasilkan oleh AI

A hacker group called ByteToBreach has leaked sensitive information from a government IT system on the darknet. The leak includes source code, passwords, and personal data from a platform managed by IT consultant CGI Sweden. Authorities like Cert-SE confirm they are aware of the reports but decline to comment.

Personal information of about 4.5 million members of Seoul's public bike sharing service Ttareungyi is believed to have leaked in 2024, leading to a police investigation. The breach, suspected to be the work of hackers, is thought to have occurred around the time of widespread DDoS attacks on public institutions.

Dilaporkan oleh AI

A massive data breach at e-commerce giant Coupang exposed personal information of 33.7 million customers from June 24 to November 8. Officials revealed the attacker exploited the company's electronic signature key, prompting a thorough government investigation. The incident has heightened public concerns over South Korea's data protection capabilities.

Situs hiburan dewasa Frivol mengungkapkan kebocoran data yang mungkin memengaruhi sekitar 479.000 pengguna. Pelanggaran tersebut melibatkan basis data terbuka yang berisi detail pengguna. Pengungkapan tersebut dilaporkan pada 25 Februari 2026.

Dilaporkan oleh AI

Pelanggaran data signifikan telah membahayakan informasi kartu kredit lebih dari 5,6 juta individu. Insiden ini melibatkan 700Credit, di mana data dicuri melalui integrasi API pihak ketiga. Detailnya muncul dalam laporan terbaru tentang ancaman keamanan siber.

Pelanggaran data besar-besaran di China dilaporkan membocorkan 8,7 miliar catatan setelah basis data raksasa dibiarkan tidak terkunci di internet. Insiden ini, yang dirinci dalam laporan terbaru, menyoroti kerentanan dalam praktik keamanan data. Pihak berwenang belum mengonfirmasi luas paparan penuh.

Dilaporkan oleh AI

A massive data breach at South Korea's leading e-commerce firm Coupang has exposed personal information of 33.7 million customers. Police are tracking a Chinese former employee suspect using an IP address, while the government considers fines up to 1 trillion won. The breach, starting in June, went undetected for five months.

 

 

 

Situs web ini menggunakan cookie

Kami menggunakan cookie untuk analisis guna meningkatkan situs kami. Baca kebijakan privasi kami untuk informasi lebih lanjut.
Tolak