Everest Ransomware Leaks Data of 72 Million Under Armour Customers After Failed Talks

Everest Ransomware Group Claims Under Armour Breach, Publishes Data of 72 Million Customers on Dark Web

HIGH
January 22, 2026
January 27, 2026
4m read
RansomwareData BreachThreat Actor

Impact Scope

People Affected

72.7 million

Affected Companies

Under Armour

Industries Affected

Retail

Related Entities(initial)

Threat Actors

Everest

Other

Under Armour

Full Report(when first published)

Executive Summary

The Everest ransomware group has claimed responsibility for a major data breach targeting Under Armour, a global athletic apparel company. On its dark web leak site, the group announced it was releasing a massive trove of data allegedly stolen from the company after negotiations failed. The leak reportedly contains 191 million records, including the personal information of over 72 million unique customers. This data includes full names, email addresses, phone numbers, and purchase histories. The public release of this data exposes affected customers to a high risk of follow-on attacks, including sophisticated phishing campaigns and identity theft, and represents a significant reputational blow to Under Armour.


Threat Overview

  • Threat Actor: Everest is a known ransomware group that operates a Ransomware-as-a-Service (RaaS) model and is notorious for its double-extortion tactics. They exfiltrate large volumes of sensitive data before encrypting a victim's systems and use the threat of a public data leak as leverage for payment.
  • Victim: Under Armour, a major U.S.-based company that manufactures footwear, sports, and casual apparel.
  • Attack Type: This is a classic double-extortion ransomware attack, where data exfiltration (T1048 - Exfiltration Over Alternative Protocol) precedes data encryption (T1486 - Data Encrypted for Impact). The public leak is the final stage after the victim refuses to pay the ransom.

Technical Analysis

While the initial access vector has not been disclosed, Everest's typical TTPs involve exploiting known vulnerabilities in public-facing applications, phishing campaigns to steal credentials, or compromising third-party suppliers. Once inside the network, they perform reconnaissance to locate high-value data, such as customer databases and financial records. The data is then compressed and exfiltrated to attacker-controlled infrastructure. The claim of 191 million records and 72.7 million unique emails suggests the attackers gained access to a primary customer relationship management (CRM) or e-commerce database. The publication of the data on hacker forums indicates the group's intent to maximize the damage and pressure on the victim.

Impact Assessment

  • For Customers: The 72.7 million affected individuals are now at a severe risk of:
    • Targeted Phishing: Attackers can use purchase history and personal details to craft highly convincing phishing emails.
    • Identity Theft: Full names, email addresses, phone numbers, and locations can be used to open fraudulent accounts or for social engineering.
    • Spam and Scams: The leaked email addresses and phone numbers will be added to lists used for widespread spam and scam campaigns.
  • For Under Armour:
    • Reputational Damage: A breach of this scale severely erodes customer trust.
    • Financial Costs: The company faces potential regulatory fines (e.g., under GDPR or CCPA), costs for incident response, customer support, and potential lawsuits.
    • Competitive Disadvantage: Leaked customer preferences and purchase histories could be exploited by competitors.

Detection & Response

Organizations should focus on detecting the TTPs common to such breaches:

  1. Data Exfiltration Monitoring: Use D3FEND technique Network Traffic Analysis (D3-NTA) to monitor for unusually large or sustained outbound data flows from internal database servers to unknown external IP addresses.
  2. Anomalous Database Access: Monitor for and alert on unusual access patterns to critical databases, such as a service account querying millions of records outside of normal business hours.
  3. Credential Abuse: Look for signs of compromised credentials being used to access sensitive systems, aligning with D3FEND's Domain Account Monitoring.

Mitigation

To prevent similar attacks, organizations should implement a defense-in-depth strategy:

  1. Data Encryption: Encrypt sensitive customer data both at rest and in transit. This is a core principle of MITRE ATT&CK Mitigation M1041 - Encrypt Sensitive Information.
  2. Network Segmentation: Implement robust network segmentation (M1030 - Network Segmentation) to prevent attackers from moving laterally from a compromised entry point to critical database servers.
  3. Immutable Backups: Maintain offline, immutable backups of critical data to ensure recovery from a ransomware encryption event without needing to pay a ransom.
  4. Multi-Factor Authentication (MFA): Enforce MFA (M1032 - Multi-factor Authentication) on all accounts, especially for remote access and access to sensitive systems, to prevent credential-based attacks.

Timeline of Events

1
January 22, 2026
This article was published

Article Updates

January 27, 2026

Severity increased

A class-action lawsuit has been filed against Under Armour following the Everest ransomware data breach, with additional PII types like gender and date of birth confirmed as exposed.

New developments in the Under Armour data breach, attributed to the Everest ransomware group, include the filing of a class-action lawsuit against the company in the U.S. This legal action highlights the escalating consequences for Under Armour following the exposure of 72 million customer records. Furthermore, the leaked dataset has been confirmed to include additional Personally Identifiable Information (PII) such as customer genders and dates of birth, alongside previously reported names, emails, phone numbers, locations, and purchase histories. The initial ransomware attack occurred in November 2025, leading to the data leak in January 2026 after failed ransom negotiations. The lawsuit underscores the increased legal and financial repercussions for the company and heightened risks for affected individuals.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Dark WebData BreachEverestPIIRansomwareUnder Armour

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading