72.7 million
The Everest ransomware group has claimed responsibility for a major data breach targeting Under Armour, a global athletic apparel company. On its dark web leak site, the group announced it was releasing a massive trove of data allegedly stolen from the company after negotiations failed. The leak reportedly contains 191 million records, including the personal information of over 72 million unique customers. This data includes full names, email addresses, phone numbers, and purchase histories. The public release of this data exposes affected customers to a high risk of follow-on attacks, including sophisticated phishing campaigns and identity theft, and represents a significant reputational blow to Under Armour.
T1048 - Exfiltration Over Alternative Protocol) precedes data encryption (T1486 - Data Encrypted for Impact). The public leak is the final stage after the victim refuses to pay the ransom.While the initial access vector has not been disclosed, Everest's typical TTPs involve exploiting known vulnerabilities in public-facing applications, phishing campaigns to steal credentials, or compromising third-party suppliers. Once inside the network, they perform reconnaissance to locate high-value data, such as customer databases and financial records. The data is then compressed and exfiltrated to attacker-controlled infrastructure. The claim of 191 million records and 72.7 million unique emails suggests the attackers gained access to a primary customer relationship management (CRM) or e-commerce database. The publication of the data on hacker forums indicates the group's intent to maximize the damage and pressure on the victim.
Organizations should focus on detecting the TTPs common to such breaches:
Network Traffic Analysis (D3-NTA) to monitor for unusually large or sustained outbound data flows from internal database servers to unknown external IP addresses.Domain Account Monitoring.To prevent similar attacks, organizations should implement a defense-in-depth strategy:
M1041 - Encrypt Sensitive Information.M1030 - Network Segmentation) to prevent attackers from moving laterally from a compromised entry point to critical database servers.M1032 - Multi-factor Authentication) on all accounts, especially for remote access and access to sensitive systems, to prevent credential-based attacks.A class-action lawsuit has been filed against Under Armour following the Everest ransomware data breach, with additional PII types like gender and date of birth confirmed as exposed.
New developments in the Under Armour data breach, attributed to the Everest ransomware group, include the filing of a class-action lawsuit against the company in the U.S. This legal action highlights the escalating consequences for Under Armour following the exposure of 72 million customer records. Furthermore, the leaked dataset has been confirmed to include additional Personally Identifiable Information (PII) such as customer genders and dates of birth, alongside previously reported names, emails, phone numbers, locations, and purchase histories. The initial ransomware attack occurred in November 2025, leading to the data leak in January 2026 after failed ransom negotiations. The lawsuit underscores the increased legal and financial repercussions for the company and heightened risks for affected individuals.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats