Monday, March 24, 2025
Homecyber securityHackers Stole Over 1.8 Million People Credit Card Data From Sports Gear...

Hackers Stole Over 1.8 Million People Credit Card Data From Sports Gear Sites

Published on

SIEM as a Service

Follow Us on Google News

Four well-renowned affiliated online sports gear websites have recently unveiled and reported a massive cyberattack. In this cyberattack, the hackers have compromised and stolen more than 1.8 million people’s credit card information.

A law firm representing these four sports gear websites has disclosed that on October 1st, 2021 a data breach took place in which the hackers have compromised personal information and credit card information; for now, the firm concluded with this much detail only.

Affected websites

The four affiliated online sports gear websites that are compromised by the hackers are:-

Running Warehouse LLC

  • Type of Organization: Other Commercial
  • Entity website: runningwarehouse.com
  • Street Address: 1295 Bluegrass Lakes Parkway
  • City: Alpharetta
  • State, or Country if outside the US: Georgia
  • Zip Code: 30004
  • Deals in: Running apparel
  • Breach: External system breach (hacking)
  • Date(s) Breach Occurred: 10/01/2021
  • Date Breach Discovered: 11/29/2021

Tennis Warehouse LCC

  • Type of Organization: Other Commercial
  • Entity website: tennis-warehouse.com
  • Street Address: 1295 Bluegrass Lakes Parkway
  • City: Alpharetta
  • State, or Country if outside the US: Georgia
  • Zip Code: 30004
  • Deals in: Tennis apparel
  • Breach: External system breach (hacking)
  • Date(s) Breach Occurred: 10/01/2021
  • Date Breach Discovered: 11/29/2021

Skate Warehouse LLC 

  • Type of Organization: Other Commercial
  • Entity website: skatewarehouse.com
  • Street Address: 1295 Bluegrass Lakes Parkway
  • City: Alpharetta
  • State, or Country if outside the US: GA
  • Zip Code: 30004
  • Deals in: Skateboards and skating apparel
  • Breach: External system breach (hacking)
  • Date(s) Breach Occurred: 10/01/2021
  • Date Breach Discovered: 11/29/2021

Tackle Warehouse LLC

  • Type of Organization: Other Commercial
  • Entity website: tacklewarehouse.com
  • Street Address: 1295 Bluegrass Lakes Parkway
  • City: Alpharetta
  • State, or Country if outside the US: GA
  • Zip Code: 30004
  • Deals in: Fishing gear
  • Breach: External system breach (hacking)
  • Date(s) Breach Occurred: 10/01/2021
  • Date Breach Discovered: 11/29/2021

Data compromised

In this event, the threat actors have stolen more than 1.8 million people credit cards data which includes the following type of data:-

  • Full name
  • Financial account number
  • Credit card number
  • Debit card number
  • Website account password
  • Credit card CVV number
  • Debit card CVV number

On 15th October these sites realized that they have been compromised, and on 29th November they notified their customers about this data breach in which the hackers have stolen over 1.8 million credit cards data. Finally, on 16th December they informed and sent security notices to all the affected individuals.

Here’s what Tackle’s notification states:-

“Upon becoming aware of the incident, Tackle Warehouse took the measures referenced above. We also reported the incident to the payment card brands in an attempt to prevent fraudulent activity on the affected accounts. However, we have reported this incident to law enforcement and have worked closely with the digital forensics and security firms to enhance the security of our sites to facilitate safe and secure transactions.”

Recommendation

From these four compromised websites, if you have made any transaction for purchasing anything then you should keep track of all the following things:-

  • Incoming communications with vigilance.
  • Monitor your bank account.
  • Credit card statements.
  • immediately report any suspicious transactions.

Apart from this, the compromised data is extremely sensitive but, at this moment, the portals have didn’t provided any identity protection service to all their affected customers.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

CleanStack: Dual-Stack Solution to Defend Against Memory Corruption Attacks

CleanStack is a novel stack protection mechanism designed to combat memory corruption attacks, which...

Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence

A recent cyber espionage operation by a China-nexus threat actor, dubbed "Weaver Ant," has...

FCC Investigates Chinese Entities on US Government’s Prohibited List

The Federal Communications Commission (FCC) has initiated a new investigation into Chinese entities previously...

VanHelsingRaaS Emerges, Targeting Linux, BSD, ARM, and ESXi Systems

VanHelsingRaaS, a newly launched ransomware-as-a-service (RaaS) program, has quickly gained traction in the cybercrime...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CleanStack: Dual-Stack Solution to Defend Against Memory Corruption Attacks

CleanStack is a novel stack protection mechanism designed to combat memory corruption attacks, which...

Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence

A recent cyber espionage operation by a China-nexus threat actor, dubbed "Weaver Ant," has...

VanHelsingRaaS Emerges, Targeting Linux, BSD, ARM, and ESXi Systems

VanHelsingRaaS, a newly launched ransomware-as-a-service (RaaS) program, has quickly gained traction in the cybercrime...