Connect with us
Everest Ransomware Group Exposes 343 GB Data in Under Armour Breach

Data Breach

Everest Ransomware Group Exposes 343 GB Data in Under Armour Breach

Everest Ransomware Group Exposes 343 GB Data in Under Armour Breach

When the Everest ransomware collective posted its claim on the dark‑web leak forum on November 16, 2025, the sportswear world took a moment to breathe. The group announced that it had siphoned 343 gigabytes of internal data from Under Armour, a figure that dwarfs most conversations about data exposure. The message was accompanied by a trove of sample files that, if authentic, would confirm the scale of the theft.

Who’s Behind the Attack?

Everest emerged onto the cyber‑crime scene in 2021, quickly establishing a reputation for sophisticated, data‑driven attacks. Unlike traditional ransomware that locks files and demands payment, Everest has favored a model of exfiltration followed by extortion. Their modus operandi relies on stealthy data collection and the threat of a public dump if demands are not met.

Data at Stake

The stolen payload is a mosaic of personal and corporate information. It includes customer transaction histories, email addresses, physical addresses, phone numbers, passport details, and gender data. Employees’ professional and personal email addresses across multiple countries also appear in the files, widening the potential for phishing campaigns.

Corporate Intelligence in the Mix

Beyond personal data, the breach reportedly contains internal company documents, shopping histories, complete product catalogs with stock‑keeping units, pricing tables, inventory status, marketing logs, and user behavior analytics. This level of detail suggests that attackers had deep access to Under Armour’s customer relationship management system, e‑commerce platform, or personalization databases. The exact entry point remains speculative, but a breach through marketing or product registration infrastructure is plausible.

Everest’s Playbook

Everest’s history offers context for the current incident. Prior victims include AT&T’s carrier database, which exposed more than 500,000 users, Dublin Airport, where 1.5 million passenger records were leaked, and Coca‑Cola’s internal files. The group’s strategy has consistently involved data exfiltration followed by a threat to release the content if a ransom is not paid.

Ultimatums and Escalation

After the Under Armour breach was announced, Everest issued a seven‑day deadline via encrypted messaging, demanding that the company contact them before further data would be made public. Curiously, no ransom amount was specified in the initial post, a tactic that has appeared in other Everest operations. Analysts infer that the group may use escalating data releases as leverage, a chilling reminder that not all cyber extortion is about money.

Why Under Armour Is a Prime Target

Under Armour’s global footprint—operating in 190 countries from its headquarters in Baltimore—creates a vast attack surface. The brand’s portfolio includes MyFitnessPal, which suffered a 2018 breach impacting 150 million users. That past incident already demonstrated the company’s vulnerability to large‑scale data loss.

Supply Chain Concerns

The exposure of passport details and international employee information adds a new layer of risk. Supply‑chain attacks are on the rise, and the presence of personally identifiable data in the breach could enable highly targeted phishing or social engineering campaigns. The sheer breadth of the dataset, including financial transaction records, suggests that fraudsters could orchestrate sophisticated identity theft schemes.

Technical Vulnerabilities Exploited

Investigators point to several critical vulnerabilities that could have facilitated the intrusion. Windows Active Directory elevation of privilege, documented as CVE‑2024‑21883, offers a direct route to domain compromise. Remote code execution in Microsoft SharePoint (CVE‑2024‑38063) can allow attackers to siphon data from enterprise repositories. SQL Server authentication bypass (CVE‑2024‑27956) provides access to customer and transaction databases, while Cobalt Strike command‑and‑control evasion (CVE‑2024‑35264) helps maintain persistence in the network.

Why These CVEs Matter

Each identified vulnerability carries a high CVSS score, underscoring the potential impact. An attacker who successfully exploits one of these weaknesses could gain privileged access, exfiltrate sensitive data, and evade detection. The combination of these exploits paints a picture of an attacker who is both technically proficient and strategically patient.

Industry Repercussions

Under Armour’s breach reverberates beyond the sportswear industry. It signals to other consumer‑facing brands that the data they collect and store—especially personal and transactional information—remains a lucrative target for cybercriminals who prefer data over encryption. The incident also highlights the growing trend of ransomware groups prioritizing data intelligence extraction over traditional file‑locking tactics.

Lessons for the Digital Marketplace

Companies must reassess their threat models, focusing on securing customer relationship management systems, e‑commerce platforms, and any data that could be monetized. Regular vulnerability assessments, patch management, and zero‑trust architectures become non‑negotiable components of a robust cybersecurity strategy.

Future Outlook

As Everest continues to refine its data‑driven extortion model, the cybersecurity community must adapt. Emerging defensive measures such as automated threat hunting, real‑time breach detection, and advanced data loss prevention will be essential. The Under Armour incident serves as a stark reminder that in an era where data is currency, protecting it requires vigilance, ingenuity, and an understanding that attackers will stop at nothing to get what they want.

More in Data Breach