Potentially millions of customers and employees
The Everest ransomware group, a Russian-speaking cybercriminal operation, has claimed responsibility for a significant data breach targeting McDonald's India. On January 20, 2026, the group posted on its dark web leak site that it had successfully exfiltrated 861 gigabytes of data from the fast-food chain's Indian franchise operations. The attackers are demanding a ransom and have threatened to leak the stolen data, which allegedly includes sensitive personal information of customers and employees, alongside internal company files. This incident, if confirmed, represents a major security failure and poses a substantial risk of identity theft and fraud for individuals across the Indian subcontinent. It also highlights a recurring pattern of security vulnerabilities for McDonald's India, following previous data breaches.
The Everest ransomware group announced the alleged breach via a post on their dedicated leak site, a common tactic in double-extortion ransomware schemes. By claiming to have stolen 861 GB of data, the group aims to pressure McDonald's India into paying a ransom to prevent the public disclosure of potentially damaging information. The group's post stated, "personal data of your customers and internal documents were leaked into our storage."
The compromised dataset is believed to be extensive, containing personally identifiable information (PII) such as names, contact details, and transaction histories of a large number of customers and employees. The public release of such data could fuel a wave of targeted phishing attacks, identity theft, and other fraudulent activities.
This is not the first time McDonald's India has faced cybersecurity issues. The franchise previously experienced data security incidents in 2017 and 2024, suggesting that underlying security weaknesses may not have been fully remediated. The Everest group has been active since at least December 2020 and is known for targeting high-profile organizations, stealing their data, and then demanding payment. As of January 21, 2026, McDonald's India has not publicly commented on the claims.
While the specific attack vector is unknown, the TTPs of groups like Everest typically involve:
T1190 - Exploit Public-Facing Application: A possible initial access vector targeting web servers or VPNs.T1566 - Phishing: Another likely method to steal employee credentials.T1048 - Exfiltration Over Alternative Protocol: Used to transfer the large volume of stolen data out of the network.T1486 - Data Encrypted for Impact: The final step of deploying the ransomware to encrypt files.T1657 - Financial Theft: The ultimate goal of the operation is financial gain through extortion.If the claims by the Everest group are true, the impact on McDonald's India and its customers could be severe:
Organizations can hunt for signs of a similar breach by looking for:
| Type | Value | Description |
|---|---|---|
| Network Traffic Pattern | Sustained high-volume egress traffic | A continuous, large-scale data transfer from an internal database or file server to an external IP address over several hours or days is a primary indicator of mass data exfiltration. |
| Log Source | Database access logs | Anomalous access patterns to customer databases, such as a single service account querying and exporting large numbers of records. |
| Command Line Pattern | 7z.exe a -p[password] <archive> <folder> |
Use of compression tools like 7-Zip or WinRAR to stage and password-protect data before exfiltration. |
| File Name | Files with a .everest extension (example) |
The presence of files encrypted with the ransomware's specific extension, alongside ransom notes in affected directories. |
D3-NTA - Network Traffic Analysis is essential.Everest ransomware group provided screenshots as proof of McDonald's India breach, showing financial reports, internal audits, and investor contact database, suggesting ERP system compromise.
The Everest ransomware group has released screenshots as proof of their alleged data breach at McDonald's India. These images purportedly display internal financial reports, audit trails, and a 'Contact Database' containing investor and partner information from multiple regions including the US, UK, Singapore, and India. This new evidence strongly suggests a deeper compromise, potentially involving core accounting or Enterprise Resource Planning (ERP) systems, escalating the potential impact beyond initial reports of general sensitive data. The group also issued a two-day deadline for McDonald's India to respond to their ransom demands.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats