PROBABLYPWNED
Data BreachesApril 15, 20264 min read

Basic-Fit Breach Exposes Bank Details for 1M Gym Members

Dutch fitness chain Basic-Fit confirms hackers accessed bank account details, addresses, and personal data for up to 1 million members across six European countries.

Sarah Mitchell

Dutch fitness giant Basic-Fit disclosed a breach affecting up to 1 million members across Europe, with attackers accessing bank account details, names, addresses, and contact information. The company detected unauthorized access on April 14 through its monitoring systems and says it stopped the intrusion within minutes—but not before hackers exfiltrated member data.

What Was Stolen

Basic-Fit confirmed the compromised data includes:

  • Bank account details (IBAN numbers)
  • Names and physical addresses
  • Email addresses
  • Phone numbers
  • Dates of birth
  • Membership information

The company stated that passwords and identification documents were not accessed. No evidence of data misuse or public exposure has surfaced yet, though that could change.

Geographic Scope

Members across six European countries are affected: the Netherlands, Belgium, Luxembourg, France, Spain, and Germany. Initial company disclosures claimed only 200,000 Dutch members were impacted, but Dutch media reporting pushed the actual figure closer to 1 million across all markets.

Basic-Fit operates over 2,150 clubs in 12 countries with 5.8 million total members. The breach affects roughly 17% of their entire customer base.

The Attack Timeline

According to Basic-Fit's statement, the breach unfolded quickly:

  1. Attackers gained unauthorized access to internal systems
  2. Company monitoring processes detected the intrusion
  3. Access was terminated "within minutes of discovery"
  4. Investigation confirmed "some data from its systems was downloaded"

The company hasn't disclosed how attackers initially gained access. No threat actor has publicly claimed responsibility, and Basic-Fit hasn't confirmed whether this was ransomware, credential theft, or another attack vector.

Financial Data Risk

Bank account details make this breach particularly dangerous. With IBAN numbers combined with names and addresses, attackers have everything needed for:

  • Fraudulent direct debits - In SEPA countries, knowing an IBAN allows initiating debits that victims must dispute after the fact
  • Identity verification bypass - Bank details plus birth dates can satisfy KYC checks at some financial services
  • Targeted phishing - Attackers can craft convincing emails referencing real membership details
  • Social engineering - Customer service representatives at banks may accept these details as identity confirmation

The FBI's 2025 IC3 report documented over $20 billion in cybercrime losses, with business email compromise and identity fraud among the top categories. Financial data exposure feeds directly into those attack chains.

Third-Party Breach Patterns

This incident follows a pattern we've seen repeatedly in 2026. Last week, Crunchyroll's breach exposed 6.8 million records when attackers compromised a Telus International support contractor through malware-captured Okta credentials. The UNC6783 campaign targeting BPO providers demonstrates how threat actors increasingly target the supply chain around customer service operations.

Basic-Fit hasn't confirmed whether their breach involved a third-party provider, but modern fitness chains typically outsource payment processing, customer support, and marketing systems—all potential attack surfaces.

What Members Should Do

If you're a Basic-Fit member in affected countries:

  1. Monitor bank accounts closely - Watch for unauthorized direct debits or suspicious activity
  2. Enable transaction alerts - Most European banks offer SMS or app notifications for account activity
  3. Verify any Basic-Fit communications - Expect phishing attempts referencing your real membership
  4. Consider new payment details - For high-value accounts, updating IBAN information with your bank eliminates the exposed credentials
  5. Report suspicious contacts - Forward phishing attempts to your local data protection authority

Why This Matters

Fitness chains hold sensitive personal data: physical addresses where people live, workout schedules indicating when homes are empty, payment information, and health-related data at some facilities. A breach at this scale provides attackers detailed profiles on a million people.

For readers wanting to understand how these data breaches typically unfold and the long-term risks they create, the exposure of financial details adds urgency that simple credential theft doesn't.

Basic-Fit says it's working with authorities and continues monitoring for data misuse. Given the 31-day gap between initial company awareness (per their timeline) and public disclosure, affected members have already lost valuable response time.

Related Articles