If you gave personal data to Under Armour, watch out. The fitness brand is investigating a potential data breach after a ransomware group claimed to have stolen 343GB of corporate data, including customer information.
Data allegedly stolen from the hack has started to circulate more widely, including in a hacker’s forum. Data breach notification site HaveIBeenPwned.com received a copy and says it contains 72 million email addresses, along with names, dates of birth, and purchase information.
This Tweet is currently unavailable. It might be loading or has been removed.
In November, the Everest ransomware group claimed responsibility for infiltrating Under Armour. It later dumped all of the stolen information online after Under Armour reportedly failed to respond to the ransom demand.
Oddly, Under Armour told News that its investigation into the breach remains “ongoing,” despite Everest posting about the hack two months ago. The retailer also hasn’t publicly mentioned the incident on its website or in financial filings. For now, a spokesperson for Under Armour told News: “Importantly, at this time, there’s no evidence to suggest this issue affected UA.com or systems used to process payments or store customer passwords.”
Still, there are signs that at least some of the data in the breach is real. One Under Armour customer in Texas, Orvin Ganesh, filed a class-action lawsuit against the fashion brand last month after Capital One’s CreditWise monitoring service sent him an alert, “informing him that his email address was exposed in a breach of underarmour.com and found on the dark web.”
Recommended by Our Editors
The danger is that stolen information could be exploited for identity theft or for bombarding users with phishing emails and other scams. A few other Under Armour users have reported receiving the same alert from CreditWise. And at least three former employees have filed class-action lawsuits in Maryland, where the clothing brand is based, over the alleged breach.
Get Our Best Stories!
Stay Safe With the Latest Security News and Updates
By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy
Policy.
Thanks for signing up!
Your subscription has been confirmed. Keep an eye on your inbox!
About Our Expert
Michael Kan
Senior Reporter
Experience
I’ve been a journalist for over 15 years. I got my start as a schools and cities reporter in Kansas City and joined PCMag in 2017, where I cover satellite internet services, cybersecurity, PC hardware, and more. I’m currently based in San Francisco, but previously spent over five years in China, covering the country’s technology sector.
Since 2020, I’ve covered the launch and explosive growth of SpaceX’s Starlink satellite internet service, writing 600+ stories on availability and feature launches, but also the regulatory battles over the expansion of satellite constellations, fights with rival providers like AST SpaceMobile and Amazon, and the effort to expand into satellite-based mobile service. I’ve combed through FCC filings for the latest news and driven to remote corners of California to test Starlink’s cellular service.
I also cover cyber threats, from ransomware gangs to the emergence of AI-based malware. Earlier this year, the FTC forced Avast to pay consumers $16.5 million for secretly harvesting and selling their personal information to third-party clients, as revealed in my joint investigation with Motherboard.
I also cover the PC graphics card market. Pandemic-era shortages led me to camp out in front of a Best Buy to get an RTX 3000. I’m now following how President Trump’s tariffs will affect the industry. I’m always eager to learn more, so please jump in the comments with feedback and send me tips.
Read Full Bio
