Everest Ransomware Group Leaks 343GB of Under Armour Customer Data

Russia-Linked Everest Group Leaks 343 GB of Data Allegedly Stolen from Under Armour

HIGH
January 25, 2026
5m read
RansomwareData BreachThreat Actor

Impact Scope

People Affected

Millions of customers

Affected Companies

Under Armour

Industries Affected

Retail

Related Entities

Threat Actors

Everest

Full Report

Executive Summary

The Everest ransomware group, a threat actor with reported links to Russia, has published 343 GB of data allegedly exfiltrated from the systems of Under Armour. The data was leaked on the group's dark web site on January 24, 2026, after the apparel company presumably refused to pay an extortion demand. The leaked data is said to contain a significant volume of personally identifiable information (PII) belonging to millions of Under Armour customers. This incident is a classic example of the double extortion model, where the threat of public data exposure is used as the primary lever for payment, regardless of whether systems were encrypted. The breach poses a significant risk of fraud and identity theft for the affected customers.


Threat Overview

This incident highlights the continued targeting of large, consumer-facing brands by ransomware groups. These organizations are attractive targets due to the vast amounts of customer data they hold, which can be monetized or used for extortion.

Threat Actor: Everest

  • Type: Ransomware and data extortion group.
  • Ties: Often linked to Russian cybercrime circles.
  • Modus Operandi: Known for a 'double extortion' strategy: they exfiltrate large amounts of sensitive data before deploying ransomware. If the victim refuses to pay, they leak the stolen data publicly or sell it to other criminals. In some cases, they focus solely on the data theft and extortion aspect.

Technical Analysis

While the specific vector for the Under Armour breach is unknown, Everest and similar groups use a variety of TTPs to gain access and exfiltrate data.

Potential MITRE ATT&CK Techniques

Impact Assessment

The public release of 343 GB of customer data could have devastating consequences for Under Armour and its customers:

  • For Customers: Millions of individuals are now at an elevated risk of identity theft, targeted phishing campaigns, and financial fraud. The exposure of PII can have long-lasting personal security implications.
  • For Under Armour:
    • Regulatory Fines: The company faces the prospect of massive fines under data protection regulations like GDPR and CCPA, which can be calculated as a percentage of global revenue.
    • Reputational Damage: A breach of this magnitude severely damages customer trust and brand loyalty, which can take years to rebuild.
    • Financial Costs: In addition to fines, the company will incur substantial costs related to incident response, forensic investigation, customer notification, credit monitoring services, and potential class-action lawsuits.

Cyber Observables for Detection

To detect data exfiltration on this scale, security teams should monitor for:

Type Value Description
network_traffic_pattern Sustained, high-volume egress traffic A continuous, large data transfer from a database or file server to an external IP over hours or days is a major red flag.
command_line_pattern tar -czf or zip -r Use of archiving commands on production servers to package large amounts of data before exfiltration.
process_name rclone.exe, megasync.exe Execution of popular cloud sync tools on servers where they have no business purpose.
log_source Database Audit Logs A high volume of read operations from a single service account across multiple tables could indicate data dumping.

Detection & Response

  • Detection: Deploy a Data Loss Prevention (DLP) solution capable of monitoring and alerting on large outbound data transfers containing PII. Use Network Detection and Response (NDR) tools to baseline normal network traffic and alert on anomalies indicative of exfiltration. Monitor critical servers for the presence and execution of unexpected data compression or synchronization tools. D3FEND technique D3-UDTA: User Data Transfer Analysis is designed for this purpose.
  • Response: Once a leak is public, the response shifts to crisis management. The priority is to confirm the authenticity of the data, determine the scope of the breach through forensics, and fulfill legal and regulatory notification requirements. The company must be transparent with affected customers and provide support, such as credit monitoring services.

Mitigation

  1. Data Discovery and Classification: You cannot protect what you do not know you have. Implement tools and processes to continuously discover, classify, and tag sensitive data (especially PII) across the entire enterprise.
  2. Robust Access Controls: Enforce the principle of least privilege. Database service accounts should have restricted permissions, and access to sensitive data repositories should be tightly controlled and audited.
  3. Egress Traffic Filtering: As with the Nike incident, strict outbound traffic filtering is a powerful control. Block all outbound traffic from critical data servers by default, only allowing connections to specific, required systems.
  4. Network Segmentation: Isolate networks containing sensitive customer data from the general corporate network to make it harder for an attacker to pivot from a compromised endpoint to a critical database.

Timeline of Events

1
January 24, 2026
The Everest ransomware group leaks 343 GB of data allegedly stolen from Under Armour.
2
January 25, 2026
This article was published

MITRE ATT&CK Mitigations

Implement strict egress filtering to prevent large-scale data exfiltration.

Apply the principle of least privilege to data stores to limit what an attacker can access with a compromised account.

Audit

M1047enterprise

Actively monitor file access and network egress for signs of data staging and exfiltration.

D3FEND Defensive Countermeasures

To combat the threat of massive data exfiltration as seen in the Under Armour breach, organizations must implement User Data Transfer Analysis. This involves using a combination of Network Detection and Response (NDR) and Data Loss Prevention (DLP) tools to baseline normal data transfer patterns and detect significant deviations. For a retail company like Under Armour, this means establishing what a normal day of data flow from customer databases looks like. An alert should be triggered if the system detects a transfer of 343 GB of data to an unknown external IP address over a 24-hour period, as this is a massive anomaly. The analysis should focus on both volume and destination, prioritizing alerts for large transfers to non-corporate cloud services or unfamiliar autonomous systems.

Implement a strict outbound traffic filtering policy on the firewall and network segments protecting critical data, such as Under Armour's customer databases. By default, these servers should not have open access to the internet. All outbound connections should be denied unless there is an explicit and documented business need. This 'default-deny' stance makes it significantly harder for attackers to exfiltrate data. Even if they compromise the server, their malware or tools like rclone will be unable to connect to their external C2 or cloud storage buckets. This control effectively contains the breach and prevents the data leak, which is the primary point of leverage for extortion groups like Everest.

Sources & References

Ransomware Victims Daily Report 1/24/2026
Purple Ops (purpleops.io) January 24, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Everestransomwaredata leakUnder ArmourPIIdouble extortion

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading