Friday, January 31, 2025
Homecyber securityHackers Stole Over 1.8 Million People Credit Card Data From Sports Gear...

Hackers Stole Over 1.8 Million People Credit Card Data From Sports Gear Sites

Published on

SIEM as a Service

Follow Us on Google News

Four well-renowned affiliated online sports gear websites have recently unveiled and reported a massive cyberattack. In this cyberattack, the hackers have compromised and stolen more than 1.8 million people’s credit card information.

A law firm representing these four sports gear websites has disclosed that on October 1st, 2021 a data breach took place in which the hackers have compromised personal information and credit card information; for now, the firm concluded with this much detail only.

Affected websites

The four affiliated online sports gear websites that are compromised by the hackers are:-

Running Warehouse LLC

  • Type of Organization: Other Commercial
  • Entity website: runningwarehouse.com
  • Street Address: 1295 Bluegrass Lakes Parkway
  • City: Alpharetta
  • State, or Country if outside the US: Georgia
  • Zip Code: 30004
  • Deals in: Running apparel
  • Breach: External system breach (hacking)
  • Date(s) Breach Occurred: 10/01/2021
  • Date Breach Discovered: 11/29/2021

Tennis Warehouse LCC

  • Type of Organization: Other Commercial
  • Entity website: tennis-warehouse.com
  • Street Address: 1295 Bluegrass Lakes Parkway
  • City: Alpharetta
  • State, or Country if outside the US: Georgia
  • Zip Code: 30004
  • Deals in: Tennis apparel
  • Breach: External system breach (hacking)
  • Date(s) Breach Occurred: 10/01/2021
  • Date Breach Discovered: 11/29/2021

Skate Warehouse LLC 

  • Type of Organization: Other Commercial
  • Entity website: skatewarehouse.com
  • Street Address: 1295 Bluegrass Lakes Parkway
  • City: Alpharetta
  • State, or Country if outside the US: GA
  • Zip Code: 30004
  • Deals in: Skateboards and skating apparel
  • Breach: External system breach (hacking)
  • Date(s) Breach Occurred: 10/01/2021
  • Date Breach Discovered: 11/29/2021

Tackle Warehouse LLC

  • Type of Organization: Other Commercial
  • Entity website: tacklewarehouse.com
  • Street Address: 1295 Bluegrass Lakes Parkway
  • City: Alpharetta
  • State, or Country if outside the US: GA
  • Zip Code: 30004
  • Deals in: Fishing gear
  • Breach: External system breach (hacking)
  • Date(s) Breach Occurred: 10/01/2021
  • Date Breach Discovered: 11/29/2021

Data compromised

In this event, the threat actors have stolen more than 1.8 million people credit cards data which includes the following type of data:-

  • Full name
  • Financial account number
  • Credit card number
  • Debit card number
  • Website account password
  • Credit card CVV number
  • Debit card CVV number

On 15th October these sites realized that they have been compromised, and on 29th November they notified their customers about this data breach in which the hackers have stolen over 1.8 million credit cards data. Finally, on 16th December they informed and sent security notices to all the affected individuals.

Here’s what Tackle’s notification states:-

“Upon becoming aware of the incident, Tackle Warehouse took the measures referenced above. We also reported the incident to the payment card brands in an attempt to prevent fraudulent activity on the affected accounts. However, we have reported this incident to law enforcement and have worked closely with the digital forensics and security firms to enhance the security of our sites to facilitate safe and secure transactions.”

Recommendation

From these four compromised websites, if you have made any transaction for purchasing anything then you should keep track of all the following things:-

  • Incoming communications with vigilance.
  • Monitor your bank account.
  • Credit card statements.
  • immediately report any suspicious transactions.

Apart from this, the compromised data is extremely sensitive but, at this moment, the portals have didn’t provided any identity protection service to all their affected customers.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users

Authorities have delivered a major blow to the cybercrime world by dismantling two of...

Microsoft Enhances M365 Bounty Program with New Services & Rewards Up to $27,000

Microsoft has announced updates to its Microsoft 365 (M365) Bug Bounty Program, offering expanded...

Tata Technologies Hit by Ransomware Attack, Some IT Services Suspended

Tata Technologies, a leading provider of engineering and IT services, has reported a ransomware...

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...