Under Armour Suffers Massive Data Breach: 72.7 Million Customer Records Exposed in Everest Ransomware Attack
Athletic apparel giant Under Armour has become the latest victim in a troubling wave of ransomware attacks targeting major consumer brands. According to data breach notification service Have I Been Pwned (HIBP), 72.7 million customer accounts were compromised in a November 2025 ransomware attack orchestrated by the veteran Everest cybercrime group. The stolen data, which includes names, email addresses, dates of birth, purchase histories, and geographic locations, was publicly leaked on a cybercrime forum on January 18, 2026.
Executive Summary
The Under Armour breach represents one of the largest consumer data exposures of early 2026 and highlights the escalating threat facing retail and e-commerce companies. What makes this incident particularly concerning is not just its scale, but the sophistication of the Everest ransomware group—a veteran operation that has been actively targeting high-profile organizations since 2020 while maintaining a relatively low public profile compared to more notorious groups like LockBit or BlackCat.
The breach comes amid a broader pattern of attacks on major sportswear and athletic brands. Nike is currently investigating a separate breach allegedly perpetrated by the WorldLeaks ransomware group, suggesting that the athletic apparel sector has become a prime target for cybercriminals seeking high-value consumer data.
Timeline of the Breach
November 2025: Initial Compromise
Everest ransomware group gains unauthorized access to Under Armour's systems and exfiltrates customer data. The company has not publicly disclosed how attackers initially gained access, though common vectors include:
- Phishing campaigns targeting employees
- Exploitation of unpatched vulnerabilities
- Compromise of third-party vendors with system access
- Stolen or weak credentials
November 2025: Ransom Demand
Everest adds Under Armour to its dark web leak site, threatening to release stolen data unless the company pays an undisclosed ransom within seven days. Under Armour apparently declines to pay.
January 18, 2026: Public Data Leak
A member of the Everest ransomware group posts the stolen Under Armour data on a popular cybercrime forum, making it available to other threat actors for exploitation.
January 21, 2026: Have I Been Pwned Notification
HIBP ingests the leaked files and confirms 72.7 million affected accounts. The service begins notifying affected individuals by email.
January 21-22, 2026: Class Action Lawsuit
Law firm Chimicles Schwartz Kriner & Donaldson-Smith files a proposed class action lawsuit on behalf of Under Armour customer Orvin Ganesh, alleging negligence and inadequate data protection.
January 22, 2026: Under Armour Acknowledges Incident
Under Armour issues a brief statement saying it is "aware" of the data breach claims but provides few details about the scope or impact of the incident.
What Data Was Compromised
According to HIBP's analysis of the leaked data, the breach exposed:
Confirmed Data Elements
- Names (full names of account holders)
- Email addresses (72.7 million unique addresses)
- Dates of birth (enabling age verification and identity theft)
- Gender information
- Geographic locations (cities, states, countries)
- Purchase histories (details of prior transactions)
Additional Claims by Everest
The ransomware group claims the stolen data also includes:
- Phone numbers (both mobile and landline)
- Physical addresses (shipping and billing)
- Loyalty program details (UA Rewards membership information)
- Preferred store locations
If accurate, these additional data elements significantly increase the risk to affected customers, as they enable:
- Identity theft — Full profiles for creating fraudulent accounts or applying for credit
- Targeted phishing — Personalized attacks using purchase preferences and loyalty data
- Physical threats — Home addresses enable in-person crimes or mail fraud
- Financial fraud — Combination of personal data enables sophisticated account takeovers
Who Is Everest?
Unlike some ransomware groups that explode onto the scene with high-profile attacks before being dismantled or imploding, Everest has maintained a steady, relatively low-profile operation since 2020—an eternity in the ransomware world.
Operational Longevity
Everest's six-year operational history far exceeds the typical lifespan of ransomware groups, which tend to last 12-18 months before:
- Law enforcement takedowns (like LockBit's infrastructure disruption)
- Internal conflicts and group dissolution
- Rebranding to avoid law enforcement attention
- Member arrests leading to operational collapse
This longevity suggests Everest has developed sophisticated operational security, diversified revenue streams, and effective internal governance structures.
Three Revenue Streams
According to cybersecurity firm Halcyon, Everest operates a diversified criminal business model with three distinct revenue channels:
1. Double Extortion Ransomware
The traditional ransomware playbook:
- Encrypt victim systems to disrupt operations
- Exfiltrate sensitive data before encryption
- Demand ransom for both decryption key and promise not to leak data
- If unpaid, leak data on dark web sites and forums
2. Network Access Brokerage
Everest sells access to compromised networks to other threat actors:
- Initial access to corporate networks
- Elevated credential sets
- VPN configurations and access methods
- Information about security controls and valuable data locations
This approach generates revenue even from targets that might not be suitable for direct ransomware attacks.
3. Insider Recruitment Program
Perhaps most concerning, Everest actively recruits insiders within target organizations:
- Offers payments to employees who provide credentials or disable security controls
- Targeted recruitment of IT staff, security personnel, and system administrators
- Use of social engineering to identify and cultivate potential insider threats
This insider program gives Everest a significant advantage over groups relying solely on external exploitation techniques.
Previous High-Profile Targets
Everest's portfolio includes several significant breaches:
Collins Aerospace — Compromised a major aerospace and defense contractor, exfiltrating sensitive technical data
Sweden's Power Grid — Targeted critical infrastructure, demonstrating willingness to attack essential services
Brazilian Government — Attacked government systems, exposing political and administrative data
ASUS (via supplier) — Compromised the technology manufacturer through a supply chain attack, affecting internal files and potentially customer data
Dublin Airport — October 2025 attack reportedly compromised 1.5 million passenger records
Nissan Motor Corporation — January 2026 attack allegedly stole 900GB of data
McDonald's India — January 2026 attack exfiltrated 861GB of sensitive data
Under Armour — November 2025 attack exposed 72.7 million customer accounts
This diverse target list—spanning aerospace, critical infrastructure, government, technology, aviation, automotive, food service, and retail—demonstrates Everest's opportunistic approach and broad capabilities.
Why Everest Stays Under the Radar
Despite its impressive track record and six-year operational history, Everest rarely appears in rankings of most dangerous or prolific ransomware groups. This strategic obscurity offers several advantages:
Less Law Enforcement Attention
Groups like LockBit and BlackCat draw significant FBI, EUROPOL, and international law enforcement focus due to their high-profile attacks and large ransom demands. Everest's lower profile means fewer resources dedicated to tracking and dismantling the operation.
Diversified Revenue Reduces Single-Attack Pressure
By generating income from access brokerage and insider recruitment in addition to ransomware, Everest doesn't need massive headline-grabbing ransoms to remain profitable.
Operational Security Through Obscurity
Maintaining a lower public profile makes it harder for security researchers to:
- Track the group's tools, techniques, and procedures (TTPs)
- Identify infrastructure for potential takedowns
- Attribute specific attacks to Everest
- Anticipate future targets
The Sportswear Industry Under Siege
The Under Armour breach must be understood within the context of a broader campaign targeting athletic apparel companies:
Nike — January 2026
The WorldLeaks ransomware group claims to have stolen 1.4TB of data from Nike, including:
- Jordan Brand design files
- Supply chain documentation
- Internal business documents
- Potentially customer data
Nike issued a statement saying it is "investigating a potential cyber security incident."
Pattern of Targeting
Why are athletic apparel companies attractive targets?
1. Valuable Customer Data
Sportswear companies maintain detailed customer profiles including:
- Size and fit preferences
- Purchase histories revealing income levels
- Loyalty program participation
- Email and phone contact information
- Payment card data
2. Intellectual Property
Design files, manufacturing processes, and supply chain relationships represent enormous value to competitors and nation-state actors engaged in industrial espionage.
3. Global Supply Chains
Complex, multi-party supply chains create numerous potential entry points for attackers. A compromised vendor or logistics partner can provide access to the primary target.
4. Direct-to-Consumer Operations
E-commerce platforms and mobile apps create large attack surfaces with numerous potential vulnerabilities.
5. Brand Sensitivity
Athletic apparel companies invest heavily in brand image. The threat of leaked customer data and associated reputational damage creates pressure to pay ransoms.
Impact on Affected Customers
The 72.7 million individuals whose data was exposed face several risks:
Immediate Threats
Identity Theft
The combination of names, dates of birth, email addresses, and geographic locations provides sufficient information for many forms of identity fraud, including:
- Opening fraudulent credit accounts
- Filing false tax returns
- Obtaining government benefits
- Creating fake identification documents
Targeted Phishing and Social Engineering
Attackers can craft highly personalized phishing emails using:
- Purchase histories to reference specific products
- Loyalty program details to impersonate Under Armour
- Personal information to increase apparent legitimacy
Account Takeovers
Email addresses and associated personal information enable:
- Password reset attacks on various platforms
- Credential stuffing if customers reused passwords
- SIM swapping attacks to compromise two-factor authentication
Spam and Marketing Abuse
Email addresses will inevitably appear on spam lists, leading to:
- Increase in unsolicited commercial email
- Scam offers exploiting brand association
- Potential malware delivery via email
Long-Term Risks
Persistent Fraud Risk
Unlike a compromised credit card that can be cancelled and replaced, personal information cannot be changed. The exposed data enables fraud attempts for years or even decades.
Data Aggregation
Cybercriminals combine data from multiple breaches to build comprehensive profiles. Today's Under Armour data combines with yesterday's healthcare breach and tomorrow's bank compromise to create detailed dossiers enabling sophisticated fraud.
Unknown Future Uses
It's impossible to predict how adversaries will leverage this data in the future. Information that seems innocuous today might become valuable for unforeseen attack techniques or fraud schemes.
Legal and Regulatory Consequences
Class Action Lawsuit
The proposed class action filed on behalf of customer Orvin Ganesh will likely allege:
Negligence
Failure to implement reasonable security measures to protect customer data
Breach of Contract
Violation of privacy policies and terms of service promising data protection
Unjust Enrichment
Under Armour profited from collecting customer data while failing to adequately protect it
Violation of State Consumer Protection Laws
Failure to comply with various state data security and breach notification requirements
Previous retail data breach settlements provide a sense of potential liability:
- Target (2013): $18.5 million settlement with 47 states
- Home Depot (2014): $17.5 million settlement with 46 states
- Equifax (2017): $425 million settlement fund (though many received minimal payments)
Regulatory Investigations
Under Armour faces potential investigations and penalties from:
State Attorneys General
Each state where customers were affected can investigate and potentially fine the company for:
- Inadequate security practices
- Delayed breach notification
- Violations of state consumer protection laws
Federal Trade Commission
The FTC can investigate whether Under Armour:
- Engaged in deceptive practices regarding data security
- Failed to implement reasonable security measures
- Violated prior consent decrees (if applicable)
International Regulators
If European, Canadian, Australian, or other international customers were affected, Under Armour may face:
- GDPR violations (up to 4% of global revenue)
- Canada's PIPEDA enforcement
- Australia's Privacy Act penalties
- Various other international data protection laws
What Went Wrong?
While Under Armour has not disclosed details about the breach, common factors in similar incidents include:
Inadequate Network Segmentation
Failure to isolate customer databases from other network segments allowed attackers who gained initial access to move laterally and reach sensitive data.
Insufficient Monitoring and Detection
The November breach wasn't publicly disclosed until January, suggesting:
- Inadequate security information and event management (SIEM)
- Lack of user and entity behavior analytics (UEBA)
- Insufficient log analysis and anomaly detection
- Delayed or absent intrusion detection systems (IDS)
Weak Access Controls
If attackers could access 72.7 million customer records, questions arise about:
- Why wasn't access more tightly restricted?
- Were privileged accounts properly secured?
- Was multi-factor authentication required for database access?
- Were there alerts for bulk data exports?
Supply Chain Vulnerabilities
Many recent breaches occur through third-party vendors. Did Under Armour:
- Adequately vet vendor security practices?
- Monitor vendor access to customer data?
- Implement contractual security requirements?
- Conduct regular security assessments of key vendors?
Patch Management Failures
Unpatched vulnerabilities remain a primary attack vector. Did Under Armour:
- Maintain a current inventory of all systems and software?
- Implement a risk-based patch management process?
- Monitor for newly disclosed vulnerabilities in deployed software?
- Test and deploy critical patches within acceptable timeframes?
What Should Affected Customers Do?
If you're among the 72.7 million affected individuals:
Immediate Actions
1. Verify You're Affected
Check Have I Been Pwned (haveibeenpwned.com) using the email address associated with your Under Armour account.
2. Change Passwords
Reset your Under Armour password and any other accounts where you used the same or similar passwords.
3. Enable Two-Factor Authentication
Activate 2FA on your Under Armour account and all important accounts (email, financial, healthcare, etc.).
4. Monitor Financial Accounts
Watch for unauthorized transactions on credit cards and bank accounts. Set up fraud alerts.
5. Check Credit Reports
Review your credit reports from all three bureaus (Equifax, Experian, TransUnion) for unauthorized accounts or inquiries. You're entitled to free weekly reports at AnnualCreditReport.com.
6. Consider Credit Freeze
A security freeze prevents new accounts from being opened in your name. Contact each credit bureau to implement.
Ongoing Vigilance
Be Alert for Phishing
Expect personalized phishing emails referencing your Under Armour purchase history or loyalty program. Verify legitimacy before clicking links or providing information.
Monitor for Identity Theft
Watch for signs like:
- Tax returns rejected because one was already filed
- Unexpected credit denials
- Bills or collection notices for unknown accounts
- IRS letters about unreported income
Document Everything
Keep records of:
- Breach notifications received
- Time spent responding to the breach
- Money spent on protective measures
- Any fraud or identity theft you experience
This documentation will be valuable if you participate in class action litigation or file individual claims.
Stay Informed
Monitor Under Armour's communications for:
- Identity protection services they may offer
- Additional breach details as they emerge
- Settlement information if class action proceeds
What Should Under Armour Do?
Immediate Response
1. Transparent Communication
Provide clear, detailed information about:
- What happened and how attackers gained access
- Exactly what data was compromised
- What security improvements have been implemented
- What support is being offered to affected customers
2. Comprehensive Identity Protection
Offer affected customers:
- Multi-year identity theft protection and monitoring
- Credit monitoring services from all three bureaus
- Identity theft insurance with sufficient coverage limits
- Dedicated support for fraud resolution
3. Incident Response Excellence
Demonstrate that the company has:
- Fully contained the breach and expelled attackers
- Conducted thorough forensic analysis
- Implemented remediation measures
- Engaged independent security experts for validation
Long-Term Security Transformation
1. Zero Trust Architecture
Implement zero trust principles:
- Verify explicitly for every access request
- Use least-privilege access controls
- Assume breach and minimize damage potential
2. Advanced Threat Detection
Deploy modern security operations capabilities:
- AI-powered SIEM and SOAR platforms
- User and entity behavior analytics
- Deception technology (honeypots, honeytokens)
- Threat intelligence integration
3. Supply Chain Security
Rigorously manage third-party risk:
- Comprehensive vendor security assessments
- Continuous monitoring of vendor access
- Contractual security requirements with penalties
- Regular third-party penetration testing
4. Insider Threat Program
Given Everest's insider recruitment efforts:
- Implement behavioral monitoring for anomalous activity
- Establish anonymous reporting mechanisms
- Conduct regular security awareness training emphasizing insider threats
- Implement separation of duties for sensitive functions
5. Encryption and Data Minimization
- Encrypt customer data at rest and in transit
- Minimize data collection to only necessary information
- Implement data retention policies with automatic deletion
- Anonymize or pseudonymize data where possible
Implications for the Retail Sector
The Under Armour breach sends clear messages to the retail industry:
You Are a Target
If you collect customer data—especially personal information, purchase histories, and loyalty program details—you are a valuable target for ransomware groups and data thieves.
Brand Value Makes You Vulnerable
The more valuable your brand, the more pressure you'll face to pay ransoms to prevent reputational damage from data leaks.
Supply Chains Are Attack Surfaces
Your security is only as strong as your weakest vendor, partner, or service provider.
Traditional Security is Insufficient
Perimeter defenses and signature-based antivirus are inadequate against modern ransomware groups employing AI-powered tools, insider recruitment, and zero-day exploits.
Incident Response Must Be Immediate
The two-month gap between the November attack and January public disclosure suggests inadequate detection capabilities. Modern threats require real-time detection and response.
Recommendations for Retail CISOs
Technical Priorities
- Implement comprehensive logging across all systems with customer data
- Deploy AI-powered anomaly detection to identify unusual data access patterns
- Segment networks to limit lateral movement after initial compromise
- Encrypt customer databases at rest with proper key management
- Implement data loss prevention to detect and block bulk data exfiltration
- Require MFA for all privileged access to systems with customer data
- Conduct regular penetration testing including social engineering and physical security
Organizational Priorities
- Make security a board-level priority with regular reporting on risk posture
- Establish a dedicated insider threat program given Everest's recruitment tactics
- Create a cross-functional incident response team with clear roles and responsibilities
- Conduct tabletop exercises simulating ransomware and data theft scenarios
- Develop business continuity plans assuming complete system compromise
- Build relationships with law enforcement before incidents occur
Strategic Priorities
- Shift security mindset from prevention to resilience—assume compromise and minimize damage
- Invest in security operations capabilities that enable rapid detection and response
- Build cyber risk into business decisions—understand how security impacts customer trust and financial performance
- Participate in industry ISACs to share threat intelligence and best practices
- Advocate for stronger security throughout your supply chain—your vendors' security is your security
The Broader Pattern: Ransomware's Evolution
The Under Armour breach exemplifies several important trends in the ransomware ecosystem:
From Encryption to Exfiltration
Modern ransomware groups increasingly focus on data theft rather than just encryption. Why?
- Backups reduce encryption impact—companies can restore from backups
- Data has lasting value—stolen data can be sold, resold, or used for future attacks
- Extortion is more reliable—companies will pay to prevent data leaks even if they can recover systems
Professionalization of Cybercrime
Everest's diversified business model, operational longevity, and insider recruitment program demonstrate the increasing sophistication of ransomware operations. These aren't amateur hackers—they're organized criminal enterprises with HR, business development, and strategic planning.
Targeting Consumer Brands
While critical infrastructure and healthcare generate headlines, consumer brands like Under Armour, Nike, and McDonald's offer attractive targets:
- Large volumes of personal data
- Brand sensitivity to reputational damage
- Often weaker security than financial services or defense contractors
- Payment capacity without the regulatory scrutiny of healthcare or finance
Ransomware-as-a-Service Limitations
While many groups operate as RaaS (ransomware-as-a-service) with affiliates conducting attacks, Everest's direct operation model allows:
- Tighter operational security
- Consistent quality of attacks
- Better operational security
- More sophisticated long-term targeting
Conclusion: Wake-Up Call for Consumer Brands
The exposure of 72.7 million Under Armour customer records isn't just another data breach statistic—it's a stark warning that consumer brands have become prime targets for sophisticated, well-resourced ransomware operations.
Everest's six-year operational history, diversified business model, and insider recruitment program demonstrate that retail companies face threats previously associated with critical infrastructure and defense contractors. The old assumption that a modest security budget and compliance with PCI-DSS would suffice is no longer tenable.
For affected customers, the breach means years of increased fraud risk and vigilance. For Under Armour, it means regulatory investigations, class action litigation, remediation costs, and reputational damage that will take years to repair.
For the retail sector, it should mean a fundamental rethinking of cybersecurity as a core business function rather than an IT checkbox. When 72.7 million customer records can be stolen despite presumably competent security teams and substantial resources, something is fundamentally wrong with our approach to protecting consumer data.
The question facing every retail CISO is simple: Will you learn from Under Armour's experience and make the necessary investments in detection, response, and resilience before your breach, or will you be explaining to your board, customers, and regulators why you didn't take action when the warnings were clear?
