#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

32 C
Dubai
Saturday, May 31, 2025
HomeBreachedAdidas Customer Data Breach: Contact Information Stolen via Third-Party Provider

Adidas Customer Data Breach: Contact Information Stolen via Third-Party Provider

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

Global sportswear brand Adidas has disclosed a data breach involving unauthorized access to consumer contact information through a third-party customer service vendor. The incident underscores growing risks tied to supply chain security failures and third-party vendors in the cybersecurity ecosystem.

On 20 May 2025, Adidas confirmed that a cybersecurity incident exposed customer data managed by an external customer service provider. The breach involved unauthorized access to non-financial consumer information, notably contact details of individuals who had previously interacted with Adidas’ customer support. While no passwords or payment data were leaked, the incident highlights persistent vulnerabilities in third-party vendor ecosystems, especially for multinational corporations operating across multiple regulatory jurisdictions.

Timeline and Known Facts

Discovery and Immediate Response

Adidas disclosed that it “recently became aware” of the intrusion without specifying the initial detection date. The company immediately contained the incident, according to its official statement, and initiated a comprehensive forensic investigation in collaboration with leading cybersecurity experts.

The breach was traced back to an external customer service provider, an increasingly common attack surface for adversaries targeting global brands. Such indirect compromise vectors complicate threat detection and attribution efforts.

Scope of the Breach

Adidas confirmed that no passwords, credit card numbers, or payment-related data were accessed. The compromised dataset includes:

  • Full names
  • Email addresses
  • Phone numbers
  • Possibly mailing addresses

All affected individuals had contacted the Adidas customer service help desk in the past.

Regulatory Notifications Underway

As of 20 May 2025, Adidas is:

  • Notifying potentially affected consumers
  • Informing appropriate data protection authorities
  • Engaging with law enforcement, as required under global data breach notification laws including the EU GDPR, California Consumer Privacy Act (CCPA), and others.

Third-Party Risks: A Growing Threat Vector

The Adidas breach is a textbook case of supply chain vulnerability, echoing recent incidents such as the MOVEit mass exploit and the Okta customer support breach. Third-party service providers often have access to sensitive data but operate outside an organization’s core security perimeter.

Dr. Ali Fadhel, Cyber Risk Director at the Middle East Cyber Resilience Forum, commented:

“Adidas’ breach is another wake-up call for global enterprises. Vendor risk management must be as robust as internal controls, especially when customer data is involved.”

Regional and Global Impact

Middle East & Africa (MEA)

While Adidas has not released a breakdown of affected geographies, its strong retail footprint in the UAE, Saudi Arabia, Egypt, and South Africa means the MEA region could be impacted. Under local laws like Saudi Arabia’s Personal Data Protection Law (PDPL) and UAE’s Federal Decree-Law No. 45 of 2021, organizations must notify data breaches within specific timelines.

Aya Mahfouz, a cybersecurity policy analyst based in Cairo, stated:

“MEA regulators are ramping up enforcement. Multinational brands like Adidas will face increased scrutiny in how they secure data and respond to breaches.”

Europe, North America, and Beyond

In the EU, Adidas must comply with the GDPR’s 72-hour notification requirement. In the U.S., evolving state laws demand timely disclosures to affected individuals and state attorneys general.

This incident further intensifies global discussions around vendor due diligence, zero trust architectures, and enhanced cybersecurity awareness and training (SaintyNet).

Global Cybersecurity Context

This breach fits a troubling trend: attackers are increasingly targeting customer service platforms, help desks, and SaaS systems with access to sensitive consumer data. According to Verizon’s 2024 DBIR, third-party breaches accounted for 16% of total incidents in 2024, up from 11% in 2022.

Organizations must prioritize:

  • Continuous monitoring of vendor networks
  • Data minimization practices
  • Vendor contract clauses mandating strong cybersecurity controls

Technical Tactics: Known and Unknowns

While Adidas has not disclosed TTPs or IOCs involved, based on similar breaches in third-party SaaS platforms, attackers likely used:

MITRE ATT&CK MAPPING (INFERRED)

- Initial Access: T1190 (Exploit Public-Facing Application)
- Persistence: T1078 (Valid Accounts – third-party service credentials)
- Exfiltration: T1041 (Exfiltration over Command and Control Channel)
- Impact: T1565.001 (Data Manipulation – stored data)

7 Actionable Takeaways for Security Teams

  1. Conduct a full vendor risk audit focusing on data access, storage, and transmission.
  2. Implement Zero Trust principles to restrict third-party access to only what is absolutely necessary.
  3. Mandate multi-factor authentication (MFA) for all external service provider access points.
  4. Include breach reporting clauses in vendor contracts to ensure transparency.
  5. Ensure encryption of all consumer data in transit and at rest, especially across vendor systems.
  6. Simulate help desk breach scenarios as part of incident response tabletop exercises.
  7. Establish a cross-regional compliance dashboard to meet varying breach notification laws globally.

Conclusion: The Bigger Picture

Adidas’ customer data breach though limited in scope signals a broader threat facing enterprises today: trusted third-party services are now among the most targeted assets in the digital ecosystem. As adversaries exploit these indirect vectors, organizations must reinforce the cybersecurity posture of their extended networks, not just their internal systems.

Adidas’ swift response is commendable, but it also highlights the urgent need for real-time vendor monitoring, transparent incident reporting, and collaborative response ecosystems involving regulators, researchers, and enterprise stakeholders.

Sources

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here