Under Armour Breach: 72.7M Accounts Exposed
In November 2025, the Everest ransomware group claimed Under Armour as a victim and attempted to extort a ransom , alleging they had obtained access to 343GB of data. In January 2026, customer data from the incident was published publicly on a popular hacking forum , including 72M email addresses. M...
Overview
In November 2025, the Everest ransomware group listed Under Armour as a victim on their dark web leak site, claiming to have stolen 343GB of data. After an extortion attempt failed, the group published the stolen customer data on a popular hacking forum in January 2026. The exposed records include 72,742,892 email addresses, names, dates of birth, genders, and geographic locations. The data has since been indexed by Have I Been Pwned, allowing affected users to verify their exposure.
What Was Exposed
The breach exposed a broad set of personally identifiable information (PII) for over 72 million Under Armour customers:
- Email addresses – the primary vector for phishing and credential-stuffing attacks
- Full names – enable targeted social engineering
- Dates of birth – frequently used in security questions and identity verification
- Genders and geographic locations – usable for tailored fraud or account recovery attacks
While no financial data, passwords, or credit card numbers were confirmed in the dump, the combination of name, email, and DOB dramatically increases the risk of identity theft and account takeover on other services where users might reuse credentials.
How the Breach Happened
The Everest ransomware group, a known extortion operation, claimed responsibility for the attack. Based on their typical modus operandi, they likely gained initial access through phishing, stolen credentials, or an unpatched vulnerability in Under Armour’s internal systems. The group exfiltrated 343GB of data before deploying ransomware, then double-extorted Under Armour by threatening to publish the stolen data unless a ransom was paid. When payment did not materialize, they released the customer database on a public forum, ensuring maximum damage.
Account Takeover Risks
Because email addresses were exposed, affected users face immediate risks from credential-stuffing attacks - where attackers try email/password combinations stolen from other breaches on Under Armour accounts. Even if Under Armour wasn’t directly compromised for passwords, the leaked emails are valuable for phishing campaigns that trick users into revealing their passwords.
Attackers can craft messages that reference specific names, birth dates, or locations to appear legitimate. They may also attempt account recovery on other platforms where the same DOB is used as a security question.
What to Do Right Now
- Check your email on Have I Been Pwned to confirm exposure.
- Change your Under Armour password immediately, even if no password was in the dump. Use a unique, complex password.
- Enable multi-factor authentication (MFA) on your Under Armour account and any other account that shares the same email.
- Be alert for phishing emails claiming to be from Under Armour, especially those referencing your name, location, or DOB. Do not click links or download attachments.
- Review your account activity on Under Armour for unauthorized logins or changes to profile details.
- Freeze your credit if you believe your DOB or location data could be used for identity theft - though the risk is lower without SSN or financial data.
How to Check If You’re Affected
The exposed data has been added to the Have I Been Pwned database. Simply enter the email address you used for your Under Armour account to see if it appears in the breach. The service is free, secure, and does not store your email.
Security Insight
This breach demonstrates that even companies without a history of major security incidents - Under Armour was previously known for a 2018 credential-stuffing incident affecting its MyFitnessPal subsidiary - remain vulnerable to sophisticated ransomware groups. The Everest group’s decision to publish the full dataset after a failed extortion attempt highlights a critical lesson: ransomware prevention alone is insufficient. Organizations must prioritize data exfiltration detection and have incident response plans that assume customer data will be released, not just encrypted. For consumers, this breach is another reminder that email addresses and personal details are now tradeable commodities on dark web forums, and that any online account represents a potential attack surface.
Further Reading
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In January 2026, the automated investment platform Betterment confirmed it had suffered a data breach attributed to a social engineering attack . As part of the incident, Betterment customers received fraudulent crypto-related messages promising high returns if funds were sent to an attacker-control...
In April 2026, the ultra-luxury hotel brand Aman was named by ShinyHunters as the target of a "pay or leak" extortion campaign , with the data allegedly obtained from their Salesforce CRM. The data was subsequently leaked publicly and contained over 200k unique email addresses. Whilst not present on...
In April 2026, the notorious hacking collective ShinyHunters claimed they had obtained a substantial volume of data belonging to the Carnival cruise operator and attempted to extort the organisation to prevent the data from being leaked. The following week, the group published the data publicly, whi...
In December 2025, 2.3M records of WIRED magazine users allegedly obtained from parent company Condé Nast were published online . The most recent data dated back to the previous September and exposed email addresses and display names, as well as, for a small number of users, their name, phone number,...