Data belonging to 72.7 million Under Armour customers has surfaced on hacking forums following a ransomware attack by the Everest group. Have I Been Pwned ingested the leaked dataset and began alerting affected users on January 21, 2026.

Incident overview

AttributeDetails
VictimUnder Armour (athletic apparel)
AttackerEverest ransomware group
Data volume exfiltrated343 GB
Unique email addresses72,727,245
Total records191,577,365
Attack dateNovember 2025
Leak dateJanuary 18, 2026
Company responseSilent (no acknowledgment)

Timeline

DateEvent
November 2025Everest compromises Under Armour systems
November 16, 2025Everest posts Under Armour on leak site with 7-day deadline
November 2025Under Armour doesn’t respond to ransom demand or media inquiries
January 18, 2026Everest member leaks full dataset on cybercrime forum
January 21, 2026Have I Been Pwned adds dataset; public disclosure
January 2026Class action lawsuits filed in Texas and Maryland

What was exposed

Have I Been Pwned confirmed the leaked data includes:

Data TypeRecords
Email addresses72.7 million unique
NamesYes
Dates of birthYes
GendersYes
Geographic locationsYes
Purchase historyYes

Additional data claimed by Everest

Data TypeStatus
Phone numbersClaimed
Physical addressesClaimed
Loyalty program detailsClaimed
Preferred store locationsClaimed
Customer preferencesClaimed

The complete dataset contains 191,577,365 records, suggesting multiple records per customer (likely representing individual transactions or profile updates).

What was NOT exposed

Under Armour stated there’s no evidence that:

Data TypeStatus
UA.com login credentialsNot compromised
Payment processing systemsNot affected
Customer passwordsNot accessed
Credit card numbersNot included

Under Armour’s response

The company has not formally acknowledged the breach or confirmed the data’s authenticity:

DateResponse
November 2025No response to Everest’s initial posting
November 2025No response to media inquiries
January 2026”Aware” of claims; no confirmation
January 2026No direct customer notification

This silence is unusual given the scale of the breach and the public availability of the data.

Two class action lawsuits have been filed:

Texas (Orvin Ganesh v. Under Armour)

AllegationDetails
NegligenceFailure to safeguard personal information
DamagesOngoing monitoring costs, identity theft risk

Maryland (Milreace Malone v. Under Armour)

AllegationDetails
Inadequate securityFailure to implement reasonable data security measures
Encryption failuresFailure to properly encrypt sensitive information
Delayed notificationFailure to notify affected individuals promptly

Under Armour is headquartered in Baltimore, Maryland.

About the Everest ransomware group

Everest has operated since December 2020 and has evolved into a sophisticated criminal enterprise:

Business model

ActivityDescription
Traditional ransomwareEncryption + extortion
Initial Access Broker (IAB)Sells network access to other criminals
Data extortionThreatens leak without encryption

Notable previous targets

VictimSector
Collins AerospaceAerospace/Defense
Svenska kraftnätSwedish state power grid
Brazilian governmentGovernment
ASUS (via supplier)Technology
McDonald’s IndiaFast food
ChryslerAutomotive
Iberia AirlinesAviation
Multiple healthcare entitiesHealthcare

Tactics

TacticPurpose
Short deadlines (7 days)Maximum pressure for quick payment
Public leak siteReputation damage threat
Forum postingWidespread distribution if ransom unpaid
IAB servicesMonetize access even without ransom

Historical context

This isn’t Under Armour’s first major breach:

YearIncidentRecordsSource
2018MyFitnessPal breach150 millionCompromised subsidiary
2026Everest ransomware72.7 millionDirect attack on Under Armour

Under Armour sold MyFitnessPal in 2020. The current breach appears to target Under Armour’s own infrastructure rather than a subsidiary.

Risk assessment for affected customers

RiskLikelihoodImpact
Phishing attacksHighCredential theft, fraud
Account takeoverMediumIf passwords reused
Identity theftMediumWith combined PII
Physical targetingLowIf addresses exposed
Purchase history abuseMediumTargeted scams

Phishing scenarios

Attackers can use the exposed data for highly targeted phishing:

ScenarioData used
”Order confirmation” emailsPurchase history, name
”Loyalty program” scamsLoyalty details, email
”Shipping notification” fraudAddress, purchase history
Physical mail scamsName, address

Recommendations for affected customers

Immediate actions

PriorityAction
CriticalCheck Have I Been Pwned for your email
CriticalChange passwords if reused elsewhere
HighEnable MFA on Under Armour and linked accounts
HighMonitor for phishing referencing Under Armour purchases
MediumConsider credit monitoring

Watch for

IndicatorMeaning
Emails referencing specific Under Armour purchasesTargeted phishing
”Loyalty program” communications asking for verificationScam attempt
Shipping notifications for orders you didn’t placeFraud
Physical mail scams using your addressData exploitation

Lessons for organizations

The Under Armour breach illustrates several common retail security failures:

IssueImplication
72 million recordsCentralized database with broad access
343GB exfiltrationInsufficient DLP controls
Silent responseDelays customer notification
No acknowledgmentRegulatory and legal risk

Security recommendations

ControlPurpose
Data segmentationLimit blast radius of breaches
DLP implementationDetect large-scale exfiltration
Exfiltration detectionAlert on unusual data transfers
Incident response planBalance business and notification needs
Customer communicationTimely, transparent breach disclosure

Regulatory implications

JurisdictionRequirement
State privacy lawsBreach notification deadlines
GDPR (EU customers)72-hour notification requirement
FTCReasonable security expectations
Class action exposureNegligence, damages

Under Armour’s silence may create additional legal and regulatory exposure beyond the lawsuits already filed.

Context

The Under Armour breach demonstrates the ongoing evolution of ransomware tactics. Everest’s dual role as ransomware operator and initial access broker means stolen data gets monetized regardless of whether victims pay. The 343GB exfiltration before the ransom demand indicates Everest prioritizes data theft alongside encryption.

For consumers, the breach underscores that retail loyalty programs and purchase history represent valuable targeting data for attackers. The combination of email addresses, purchase patterns, and personal details enables highly convincing phishing campaigns.

Retail organizations should segment customer data, implement DLP controls that detect large-scale exfiltration, and have incident response plans that balance business considerations with customer notification obligations.