72.7 million
The Everest ransomware group has claimed responsibility for a major data breach targeting Under Armour, a global athletic apparel company. On its dark web leak site, the group announced it was releasing a massive trove of data allegedly stolen from the company after negotiations failed. The leak reportedly contains 191 million records, including the personal information of over 72 million unique customers. This data includes full names, email addresses, phone numbers, and purchase histories. The public release of this data exposes affected customers to a high risk of follow-on attacks, including sophisticated phishing campaigns and identity theft, and represents a significant reputational blow to Under Armour.
T1048 - Exfiltration Over Alternative Protocol) precedes data encryption (T1486 - Data Encrypted for Impact). The public leak is the final stage after the victim refuses to pay the ransom.While the initial access vector has not been disclosed, Everest's typical TTPs involve exploiting known vulnerabilities in public-facing applications, phishing campaigns to steal credentials, or compromising third-party suppliers. Once inside the network, they perform reconnaissance to locate high-value data, such as customer databases and financial records. The data is then compressed and exfiltrated to attacker-controlled infrastructure. The claim of 191 million records and 72.7 million unique emails suggests the attackers gained access to a primary customer relationship management (CRM) or e-commerce database. The publication of the data on hacker forums indicates the group's intent to maximize the damage and pressure on the victim.
Organizations should focus on detecting the TTPs common to such breaches:
Network Traffic Analysis (D3-NTA) to monitor for unusually large or sustained outbound data flows from internal database servers to unknown external IP addresses.Domain Account Monitoring.To prevent similar attacks, organizations should implement a defense-in-depth strategy:
M1041 - Encrypt Sensitive Information.M1030 - Network Segmentation) to prevent attackers from moving laterally from a compromised entry point to critical database servers.M1032 - Multi-factor Authentication) on all accounts, especially for remote access and access to sensitive systems, to prevent credential-based attacks.Encrypting sensitive customer PII at rest in databases can mitigate the impact of a data exfiltration event.
Mapped D3FEND Techniques:
Isolate critical customer databases in a secure network segment with strict access controls to prevent lateral movement from less secure parts of the network.
Mapped D3FEND Techniques:
Enforce MFA for all administrative access to prevent attackers from using stolen credentials to access sensitive systems.
Mapped D3FEND Techniques:
To detect a data breach like the one claimed against Under Armour, organizations must implement robust network traffic analysis focused on exfiltration patterns. This involves deploying network security monitoring tools (e.g., Zeek, Suricata) or commercial NDR solutions to baseline normal outbound traffic from critical asset zones, such as the network segments containing customer databases. Create high-priority alerts for sustained, high-volume data transfers from these servers to external destinations, especially those not on an established allowlist. The exfiltration of 72 million customer records would generate a significant network traffic anomaly that should be detectable. Monitoring for protocols often abused for exfiltration, such as DNS, ICMP, or encrypted protocols to new or uncategorized domains, can provide early warning of a breach in progress.
Deploying decoy objects, or 'honeypots,' can provide high-fidelity alerts of an intruder's presence. In the context of the Under Armour breach, this could involve creating a fake database file named customer_db_backup_prod.bak or a decoy database table named customers_pii within the production database environment. These decoy objects should have no legitimate reason to be accessed. Any interaction with them—a read, copy, or access attempt—should trigger an immediate, high-priority security alert. This technique is highly effective at catching attackers during their internal reconnaissance phase, long before they can exfiltrate massive amounts of real data.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats