Basic-Fit Breach Exposes Bank Details for 1M Gym Members
Dutch fitness chain Basic-Fit confirms hackers accessed bank account details, addresses, and personal data for up to 1 million members across six European countries.
Dutch fitness giant Basic-Fit disclosed a breach affecting up to 1 million members across Europe, with attackers accessing bank account details, names, addresses, and contact information. The company detected unauthorized access on April 14 through its monitoring systems and says it stopped the intrusion within minutes—but not before hackers exfiltrated member data.
What Was Stolen
Basic-Fit confirmed the compromised data includes:
- Bank account details (IBAN numbers)
- Names and physical addresses
- Email addresses
- Phone numbers
- Dates of birth
- Membership information
The company stated that passwords and identification documents were not accessed. No evidence of data misuse or public exposure has surfaced yet, though that could change.
Geographic Scope
Members across six European countries are affected: the Netherlands, Belgium, Luxembourg, France, Spain, and Germany. Initial company disclosures claimed only 200,000 Dutch members were impacted, but Dutch media reporting pushed the actual figure closer to 1 million across all markets.
Basic-Fit operates over 2,150 clubs in 12 countries with 5.8 million total members. The breach affects roughly 17% of their entire customer base.
The Attack Timeline
According to Basic-Fit's statement, the breach unfolded quickly:
- Attackers gained unauthorized access to internal systems
- Company monitoring processes detected the intrusion
- Access was terminated "within minutes of discovery"
- Investigation confirmed "some data from its systems was downloaded"
The company hasn't disclosed how attackers initially gained access. No threat actor has publicly claimed responsibility, and Basic-Fit hasn't confirmed whether this was ransomware, credential theft, or another attack vector.
Financial Data Risk
Bank account details make this breach particularly dangerous. With IBAN numbers combined with names and addresses, attackers have everything needed for:
- Fraudulent direct debits - In SEPA countries, knowing an IBAN allows initiating debits that victims must dispute after the fact
- Identity verification bypass - Bank details plus birth dates can satisfy KYC checks at some financial services
- Targeted phishing - Attackers can craft convincing emails referencing real membership details
- Social engineering - Customer service representatives at banks may accept these details as identity confirmation
The FBI's 2025 IC3 report documented over $20 billion in cybercrime losses, with business email compromise and identity fraud among the top categories. Financial data exposure feeds directly into those attack chains.
Third-Party Breach Patterns
This incident follows a pattern we've seen repeatedly in 2026. Last week, Crunchyroll's breach exposed 6.8 million records when attackers compromised a Telus International support contractor through malware-captured Okta credentials. The UNC6783 campaign targeting BPO providers demonstrates how threat actors increasingly target the supply chain around customer service operations.
Basic-Fit hasn't confirmed whether their breach involved a third-party provider, but modern fitness chains typically outsource payment processing, customer support, and marketing systems—all potential attack surfaces.
What Members Should Do
If you're a Basic-Fit member in affected countries:
- Monitor bank accounts closely - Watch for unauthorized direct debits or suspicious activity
- Enable transaction alerts - Most European banks offer SMS or app notifications for account activity
- Verify any Basic-Fit communications - Expect phishing attempts referencing your real membership
- Consider new payment details - For high-value accounts, updating IBAN information with your bank eliminates the exposed credentials
- Report suspicious contacts - Forward phishing attempts to your local data protection authority
Why This Matters
Fitness chains hold sensitive personal data: physical addresses where people live, workout schedules indicating when homes are empty, payment information, and health-related data at some facilities. A breach at this scale provides attackers detailed profiles on a million people.
For readers wanting to understand how these data breaches typically unfold and the long-term risks they create, the exposure of financial details adds urgency that simple credential theft doesn't.
Basic-Fit says it's working with authorities and continues monitoring for data misuse. Given the 31-day gap between initial company awareness (per their timeline) and public disclosure, affected members have already lost valuable response time.
Related Articles
ShinyHunters Breaches Rockstar Games via Anodot Token Theft
GTA 6 developer Rockstar Games confirms third-party breach after ShinyHunters stole Snowflake credentials through Anodot. Ransom deadline set for April 14.
Apr 12, 2026Mercor Breach Exposes 4TB of AI Training Data After LiteLLM Attack
AI startup Mercor confirms breach via LiteLLM supply chain attack. Lapsus$ claims 4TB stolen including candidate data, source code, and API keys. Meta pauses contracts.
Apr 10, 2026ShinyHunters Breach Anodot, Steal Data From Snowflake Customers
ShinyHunters compromised SaaS analytics provider Anodot, using stolen authentication tokens to access and exfiltrate data from dozens of Snowflake customers.
Apr 10, 2026LAPD Records Exposed in City Attorney Breach: 337K Files Leaked
World Leaks gang dumps 7TB of sensitive police data including personnel files and Internal Affairs investigations after breaching LA City Attorney's Office.
Apr 9, 2026