Sats data leaked on darknet after hacker attack

Gym chain Sats has confirmed a data breach affecting employees and members after a mid-March cyberattack. Sensitive HR data and member information have surfaced on the darknet, according to IT expert Karl Emil Nikka. The company is still investigating the full scope.

Gym chain Sats faced a hacker attack in mid-March. Initially deemed limited, the breach later appeared more extensive. On Wednesday, Sats reported that hackers accessed an internal shared storage server mainly used for accounting. Documents there included member names, contact details, and for some, additional personal information. Employee personal data also leaked.

CEO Sondre Gravir expressed regret in a statement: “Att information om anställda och medlemmar har påverkats är olyckligt. Vi beklagar konsekvenserna av detta brott.” Nordic PR chief Kristin Fjeld said a group of employees is affected and will be contacted directly, but exact figures await confirmation from the investigation. The incident has been reported to police.

IT security specialist Karl Emil Nikka from SSF Stöldskyddsförening discovered on April 1 data on over 10,000 registered users on the darknet, including names, postal addresses, phone numbers, and member numbers. Sensitive HR information such as termination agreements and investigations involving staff also leaked. “Bland de anställda så har det läckt ut betydligt värre saker,” Nikka said.

The attack comes from a hacker group active since summer 2025, which extorts hundreds of organizations by threatening to publish stolen data unless paid. Sats urges reliance solely on official information as the investigation continues.

Articoli correlati

Dramatic illustration of a darknet leak of Swedish government IT data by hackers, showing computer screens with source code, passwords, and personal files.
Immagine generata dall'IA

Swedish government IT data leaked on darknet

Riportato dall'IA Immagine generata dall'IA

A hacker group called ByteToBreach has leaked sensitive information from a government IT system on the darknet. The leak includes source code, passwords, and personal data from a platform managed by IT consultant CGI Sweden. Authorities like Cert-SE confirm they are aware of the reports but decline to comment.

A hacker known as Rootboy has begun daily data dumps from Standard Bank's systems on the dark web since 14 April, following the bank's refusal to pay a 1 Bitcoin ransom. The attack, which started on 27 February, exfiltrated 1.2TB of data from Standard Bank and Liberty. The bank has confirmed exposure of some credit card details but no CVV numbers.

Riportato dall'IA

Inditex, il gruppo tessile proprietario di Zara, ha comunicato mercoledì sera un accesso non autorizzato a database interni ospitati sui server di un fornitore terzo. L'azienda precisa che nessun dato personale dei clienti, come nomi, numeri di telefono o carte di credito, è stato compromesso. Le operazioni rimangono pienamente operative.

As the April 14 ransom deadline approaches, ShinyHunters has reiterated threats to release breached Rockstar Games data obtained via third-party Anodot, following the studio's confirmation of limited non-material access with no player impact. This updates coverage of the initial breach claim reported earlier this week.

Riportato dall'IA

German police and Europol shut down around 373,000 to 400,000 darknet sites selling gross child abuse material and scams in Operation Alice. Five Swedish men are suspected of gross child pornography crimes following a tip from German police. 440 customers were identified in the five-year investigation.

Questo sito web utilizza i cookie

Utilizziamo i cookie per l'analisi per migliorare il nostro sito. Leggi la nostra politica sulla privacy per ulteriori informazioni.
Rifiuta