millions of individuals (unverified claim)
On November 28, 2025, athletic apparel brand Under Armour confirmed it is responding to a ransomware incident that has affected its corporate IT environment. An as-yet-unidentified threat actor has claimed responsibility for the attack, asserting they have not only encrypted systems but also exfiltrated a significant amount of sensitive data. The attackers' unverified claims state that the stolen data includes records pertaining to "millions of individuals." Under Armour has engaged external cybersecurity experts to conduct a forensic investigation to assess the scope of the breach and the validity of the data theft claims. The attack has caused disruption to the company's internal operations.
Details about the attack are still emerging, but it follows the pattern of a modern double-extortion ransomware attack. The threat actors gained unauthorized access to Under Armour's internal servers, moved laterally to identify and access valuable data, and then exfiltrated it before deploying the ransomware payload to encrypt systems. The goal of this two-pronged approach is to maximize leverage for a ransom payment: the company is pressured not only by operational disruption from the encryption but also by the threat of a public data leak.
While the specific TTPs are under investigation, a typical ransomware attack of this nature would involve several stages:
T1566 - Phishing), exploitation of an unpatched vulnerability in an external-facing system (T1190 - Exploit Public-Facing Application), or the use of stolen credentials.T1046 - Network Service Discovery) to map the internal network and identify high-value data stores, such as customer databases and employee records.T1041 - Exfiltration Over C2 Channel). The claim of stealing data on "millions" suggests a compromise of a major customer or HR database.T1486 - Data Encrypted for Impact) to disrupt business operations.PsExec for lateral movement.T1558.003 - Kerberoasting).Implement comprehensive logging and auditing of file access and user activity to detect anomalous behavior indicative of a ransomware attack in progress.
Mapped D3FEND Techniques:
Segment the network to isolate critical data stores, preventing attackers from easily moving from a compromised endpoint to a core database.
Mapped D3FEND Techniques:
Enforce MFA across the enterprise to protect against attacks leveraging stolen credentials.
Mapped D3FEND Techniques:
To detect ransomware actors during their lateral movement and discovery phase, Under Armour could deploy a decoy environment, or honeypot. This involves setting up decoy servers, databases, and file shares that appear to be legitimate, high-value assets. These decoys should be instrumented with extensive monitoring. Any interaction with these systems is, by definition, malicious. For example, a fake customer database named 'UA-CUST-PROD-DB' could be placed on the network. An attacker accessing this decoy would immediately trigger a high-fidelity alert, giving security teams early warning to isolate the threat before the real production databases are reached and data is exfiltrated.
To directly counter the data exfiltration phase of this double-extortion attack, strict outbound traffic filtering is essential. Configure perimeter firewalls to deny all outbound traffic by default, and only allow connections to known, approved destinations on specific ports. This prevents an attacker from easily exfiltrating gigabytes or terabytes of stolen data to an arbitrary cloud server. This control forces the attacker to use more difficult and slower exfiltration methods, increasing the chances of detection. For a retail company like Under Armour, this means blocking outbound connections from internal database servers to any destination other than explicitly authorized internal application servers.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats