Under Armour Investigates Ransomware Attack, Data Theft Claims

Under Armour Investigating Ransomware Attack After Threat Actors Claim Theft of Data on "Millions"

HIGH
November 29, 2025
5m read
RansomwareData BreachCyberattack

Impact Scope

People Affected

millions of individuals (unverified claim)

Industries Affected

Retail

Related Entities

Full Report

Executive Summary

On November 28, 2025, athletic apparel brand Under Armour confirmed it is responding to a ransomware incident that has affected its corporate IT environment. An as-yet-unidentified threat actor has claimed responsibility for the attack, asserting they have not only encrypted systems but also exfiltrated a significant amount of sensitive data. The attackers' unverified claims state that the stolen data includes records pertaining to "millions of individuals." Under Armour has engaged external cybersecurity experts to conduct a forensic investigation to assess the scope of the breach and the validity of the data theft claims. The attack has caused disruption to the company's internal operations.

Threat Overview

Details about the attack are still emerging, but it follows the pattern of a modern double-extortion ransomware attack. The threat actors gained unauthorized access to Under Armour's internal servers, moved laterally to identify and access valuable data, and then exfiltrated it before deploying the ransomware payload to encrypt systems. The goal of this two-pronged approach is to maximize leverage for a ransom payment: the company is pressured not only by operational disruption from the encryption but also by the threat of a public data leak.

Technical Analysis

While the specific TTPs are under investigation, a typical ransomware attack of this nature would involve several stages:

  1. Initial Access: Could be achieved through various means, including phishing (T1566 - Phishing), exploitation of an unpatched vulnerability in an external-facing system (T1190 - Exploit Public-Facing Application), or the use of stolen credentials.
  2. Discovery & Lateral Movement: Once inside, attackers would perform network reconnaissance (T1046 - Network Service Discovery) to map the internal network and identify high-value data stores, such as customer databases and employee records.
  3. Data Exfiltration: Before encryption, the attackers would stage and exfiltrate large volumes of data (T1041 - Exfiltration Over C2 Channel). The claim of stealing data on "millions" suggests a compromise of a major customer or HR database.
  4. Impact: Finally, the ransomware is deployed to encrypt files across numerous systems (T1486 - Data Encrypted for Impact) to disrupt business operations.

Impact Assessment

  • Data Privacy Risk: If the attackers' claims are true, the exposure of personal data for millions of individuals could lead to widespread identity theft and fraud, triggering significant regulatory fines under laws like GDPR and CCPA.
  • Operational Disruption: The encryption of internal systems impacts day-to-day business functions, potentially affecting supply chain, logistics, and corporate administration.
  • Reputational Damage: As a major global consumer brand, a large-scale data breach can severely damage customer trust and brand loyalty.
  • Financial Cost: Under Armour faces substantial costs from the investigation, remediation, potential regulatory fines, and possible litigation from affected individuals.

Detection & Response

  • Data Loss Prevention (DLP): Implement DLP solutions to monitor and block large, unauthorized outbound data transfers. An alert from a DLP system can be an early indicator of a ransomware attack's exfiltration phase.
  • Behavioral Monitoring: Use EDR and SIEM solutions to monitor for anomalous behavior, such as a user account suddenly accessing vast numbers of files, or the use of administrative tools like PsExec for lateral movement.
  • Active Directory Auditing: Closely monitor Active Directory for signs of compromise, such as the creation of new administrative accounts, changes to group policies, or Kerberoasting attempts (T1558.003 - Kerberoasting).

Mitigation

  • Network Segmentation: Implement Network Isolation to prevent attackers from easily moving from a compromised workstation to a critical database server. This can contain the blast radius of an attack.
  • Immutable Backups: Maintain offline and immutable backups of all critical data. Regularly test the backup and restore process to ensure a swift recovery is possible without paying a ransom.
  • MFA Everywhere: Enforce Multi-factor Authentication on all accounts, especially privileged ones and those with remote access, to protect against credential theft.
  • Endpoint Hardening: Use application allowlisting and attack surface reduction rules to limit the ability of malware to execute and spread on endpoints.

Timeline of Events

1
November 28, 2025
Reports emerge that Under Armour is investigating a ransomware attack and data theft claims.
2
November 29, 2025
This article was published

MITRE ATT&CK Mitigations

Audit

M1047enterprise

Implement comprehensive logging and auditing of file access and user activity to detect anomalous behavior indicative of a ransomware attack in progress.

Mapped D3FEND Techniques:

Segment the network to isolate critical data stores, preventing attackers from easily moving from a compromised endpoint to a core database.

Mapped D3FEND Techniques:

Enforce MFA across the enterprise to protect against attacks leveraging stolen credentials.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To detect ransomware actors during their lateral movement and discovery phase, Under Armour could deploy a decoy environment, or honeypot. This involves setting up decoy servers, databases, and file shares that appear to be legitimate, high-value assets. These decoys should be instrumented with extensive monitoring. Any interaction with these systems is, by definition, malicious. For example, a fake customer database named 'UA-CUST-PROD-DB' could be placed on the network. An attacker accessing this decoy would immediately trigger a high-fidelity alert, giving security teams early warning to isolate the threat before the real production databases are reached and data is exfiltrated.

To directly counter the data exfiltration phase of this double-extortion attack, strict outbound traffic filtering is essential. Configure perimeter firewalls to deny all outbound traffic by default, and only allow connections to known, approved destinations on specific ports. This prevents an attacker from easily exfiltrating gigabytes or terabytes of stolen data to an arbitrary cloud server. This control forces the attacker to use more difficult and slower exfiltration methods, increasing the chances of detection. For a retail company like Under Armour, this means blocking outbound connections from internal database servers to any destination other than explicitly authorized internal application servers.

Sources & References

Top Data Breaches of November 2025
Strobes Security (strobes.co) November 28, 2025
Cyber Briefing: 2025-11-28
YouTube (youtube.com) November 28, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ransomwaredata breachunder armourretaildouble extortion

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading