Millions of consumers and employees
Under Armour, Inc., a major global athletic apparel brand, is now facing a proposed class action lawsuit stemming from a data breach that occurred in November 2025. The lawsuit alleges that the company acted negligently by failing to implement adequate security measures to protect the sensitive personal and private information of its customers and employees. The breach has been attributed to the Everest cybercriminal group, which reportedly exfiltrated and leaked hundreds of gigabytes of data. The complaint argues that Under Armour failed in its duty to safeguard this data, including by not encrypting it, and did not provide timely or adequate notice to affected individuals, leaving them vulnerable to identity theft and other forms of fraud.
The 40-page lawsuit lays out several key allegations against Under Armour:
The impact of this breach is twofold, affecting both the company and the individuals whose data was stolen.
For Victims:
For Under Armour:
While details of Under Armour's internal response are not public, the lawsuit's allegations suggest potential gaps:
Based on the allegations in the lawsuit, the following mitigations are critical for any organization handling large volumes of PII:
D3-FE: File Encryption.Encrypting sensitive data at rest is a critical control that would have rendered the stolen data useless to the Everest group.
Comprehensive logging and auditing of data access can help detect anomalous activity indicative of a breach in progress.
Implementing Data Loss Prevention (DLP) and egress filtering can detect and block mass exfiltration attempts.
The central allegation in the lawsuit is the failure to encrypt data. To prevent a similar outcome, organizations must implement encryption for all sensitive data at rest. For data in databases, use Transparent Data Encryption (TDE) or column-level encryption. For files stored on servers or in cloud storage, use server-side encryption (e.g., AWS S3 SSE) or encrypt files before they are uploaded. This ensures that even if an attacker bypasses perimeter defenses and gains access to the storage backend, the data they steal is computationally infeasible to read without the decryption keys, which should be managed separately and securely (e.g., in an HSM or KMS). This control changes the outcome of a breach from a catastrophic data leak to a much less severe security event.
To detect the exfiltration of 'hundreds of gigabytes' of data, as alleged in the Under Armour breach, organizations need to monitor data movement. Deploy a Data Loss Prevention (DLP) solution that can analyze network egress traffic and API calls to cloud services. Establish baselines for normal data transfer volumes for different parts of the network. Configure high-priority alerts for any transfers that significantly exceed these baselines, especially if the data is flowing from a sensitive database or file repository to an external IP address. This allows the security team to detect and potentially block a mass data theft in progress, rather than learning about it after the data appears on the dark web.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats