Everest Ransomware Leaks Data of 72 Million Under Armour Customers After Failed Talks

Everest Ransomware Group Claims Under Armour Breach, Publishes Data of 72 Million Customers on Dark Web

HIGH
January 22, 2026
4m read
RansomwareData BreachThreat Actor

Impact Scope

People Affected

72.7 million

Affected Companies

Under Armour

Industries Affected

Retail

Related Entities

Threat Actors

Full Report

Executive Summary

The Everest ransomware group has claimed responsibility for a major data breach targeting Under Armour, a global athletic apparel company. On its dark web leak site, the group announced it was releasing a massive trove of data allegedly stolen from the company after negotiations failed. The leak reportedly contains 191 million records, including the personal information of over 72 million unique customers. This data includes full names, email addresses, phone numbers, and purchase histories. The public release of this data exposes affected customers to a high risk of follow-on attacks, including sophisticated phishing campaigns and identity theft, and represents a significant reputational blow to Under Armour.


Threat Overview

  • Threat Actor: Everest is a known ransomware group that operates a Ransomware-as-a-Service (RaaS) model and is notorious for its double-extortion tactics. They exfiltrate large volumes of sensitive data before encrypting a victim's systems and use the threat of a public data leak as leverage for payment.
  • Victim: Under Armour, a major U.S.-based company that manufactures footwear, sports, and casual apparel.
  • Attack Type: This is a classic double-extortion ransomware attack, where data exfiltration (T1048 - Exfiltration Over Alternative Protocol) precedes data encryption (T1486 - Data Encrypted for Impact). The public leak is the final stage after the victim refuses to pay the ransom.

Technical Analysis

While the initial access vector has not been disclosed, Everest's typical TTPs involve exploiting known vulnerabilities in public-facing applications, phishing campaigns to steal credentials, or compromising third-party suppliers. Once inside the network, they perform reconnaissance to locate high-value data, such as customer databases and financial records. The data is then compressed and exfiltrated to attacker-controlled infrastructure. The claim of 191 million records and 72.7 million unique emails suggests the attackers gained access to a primary customer relationship management (CRM) or e-commerce database. The publication of the data on hacker forums indicates the group's intent to maximize the damage and pressure on the victim.

Impact Assessment

  • For Customers: The 72.7 million affected individuals are now at a severe risk of:
    • Targeted Phishing: Attackers can use purchase history and personal details to craft highly convincing phishing emails.
    • Identity Theft: Full names, email addresses, phone numbers, and locations can be used to open fraudulent accounts or for social engineering.
    • Spam and Scams: The leaked email addresses and phone numbers will be added to lists used for widespread spam and scam campaigns.
  • For Under Armour:
    • Reputational Damage: A breach of this scale severely erodes customer trust.
    • Financial Costs: The company faces potential regulatory fines (e.g., under GDPR or CCPA), costs for incident response, customer support, and potential lawsuits.
    • Competitive Disadvantage: Leaked customer preferences and purchase histories could be exploited by competitors.

Detection & Response

Organizations should focus on detecting the TTPs common to such breaches:

  1. Data Exfiltration Monitoring: Use D3FEND technique Network Traffic Analysis (D3-NTA) to monitor for unusually large or sustained outbound data flows from internal database servers to unknown external IP addresses.
  2. Anomalous Database Access: Monitor for and alert on unusual access patterns to critical databases, such as a service account querying millions of records outside of normal business hours.
  3. Credential Abuse: Look for signs of compromised credentials being used to access sensitive systems, aligning with D3FEND's Domain Account Monitoring.

Mitigation

To prevent similar attacks, organizations should implement a defense-in-depth strategy:

  1. Data Encryption: Encrypt sensitive customer data both at rest and in transit. This is a core principle of MITRE ATT&CK Mitigation M1041 - Encrypt Sensitive Information.
  2. Network Segmentation: Implement robust network segmentation (M1030 - Network Segmentation) to prevent attackers from moving laterally from a compromised entry point to critical database servers.
  3. Immutable Backups: Maintain offline, immutable backups of critical data to ensure recovery from a ransomware encryption event without needing to pay a ransom.
  4. Multi-Factor Authentication (MFA): Enforce MFA (M1032 - Multi-factor Authentication) on all accounts, especially for remote access and access to sensitive systems, to prevent credential-based attacks.

Timeline of Events

1
January 22, 2026
This article was published

MITRE ATT&CK Mitigations

Encrypting sensitive customer PII at rest in databases can mitigate the impact of a data exfiltration event.

Mapped D3FEND Techniques:

Isolate critical customer databases in a secure network segment with strict access controls to prevent lateral movement from less secure parts of the network.

Mapped D3FEND Techniques:

Enforce MFA for all administrative access to prevent attackers from using stolen credentials to access sensitive systems.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To detect a data breach like the one claimed against Under Armour, organizations must implement robust network traffic analysis focused on exfiltration patterns. This involves deploying network security monitoring tools (e.g., Zeek, Suricata) or commercial NDR solutions to baseline normal outbound traffic from critical asset zones, such as the network segments containing customer databases. Create high-priority alerts for sustained, high-volume data transfers from these servers to external destinations, especially those not on an established allowlist. The exfiltration of 72 million customer records would generate a significant network traffic anomaly that should be detectable. Monitoring for protocols often abused for exfiltration, such as DNS, ICMP, or encrypted protocols to new or uncategorized domains, can provide early warning of a breach in progress.

Deploying decoy objects, or 'honeypots,' can provide high-fidelity alerts of an intruder's presence. In the context of the Under Armour breach, this could involve creating a fake database file named customer_db_backup_prod.bak or a decoy database table named customers_pii within the production database environment. These decoy objects should have no legitimate reason to be accessed. Any interaction with them—a read, copy, or access attempt—should trigger an immediate, high-priority security alert. This technique is highly effective at catching attackers during their internal reconnaissance phase, long before they can exfiltrate massive amounts of real data.

Sources & References

Fake LastPass maintenance emails target users
Malwarebytes (malwarebytes.com) January 22, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

EverestRansomwareData BreachUnder ArmourDark WebPII

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading