Under Armour data breach claims trigger alerts for millions of users

16 hours ago 1

NEWYou tin present perceive to Fox News articles!

Sportswear and fittingness marque Under Armour is investigating claims of a monolithic information breach aft lawsuit records were posted connected a hacker forum. 

The breach became wide known aft millions of radical received alerts informing their accusation whitethorn person been compromised. While Under Armour says its probe is ongoing, cybersecurity researchers reviewing the leaked information accidental it appears to see idiosyncratic details perchance linked to lawsuit purchases.

According to breach notification work Have I Been Pwned, the dataset contains email addresses linked to astir 72 cardinal people, prompting the enactment to notify affected users directly. The standard of the vulnerability has raised caller concerns astir however user information tin beryllium misused agelong aft a breach occurs.

Sign up for my FREE CyberGuy Report 
Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox. Plus, you'll get instant entree to my Ultimate Scam Survival Guide – escaped erstwhile you articulation my CYBERGUY.COM newsletter.

THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS  

Someone typing connected  a machine  successful  a acheronian  room.

Millions of Under Armour customers were alerted aft stolen relationship information surfaced connected a hacker forum, bringing the breach into nationalist view. (Thomas Trutschel/Photothek via Getty Images)

What happened successful the Under Armour information breach

The stolen information is reportedly linked to a ransomware onslaught that occurred successful November 2025. At the time, the Everest ransomware radical claimed work and attempted to extort Under Armour by threatening to leak interior files. In January 2026, lawsuit information from that incidental appeared publically connected a fashionable hacking forum. Soon after, breach notification work Have I Been Pwned obtained a transcript of the information and alerted affected users by email. According to reports, the seller claimed the stolen files came straight from the November breach and included millions of lawsuit records.

What information was exposed

The leaked dataset reportedly includes a wide scope of idiosyncratic information. While outgo paper details person not been confirmed, the exposed information is inactive invaluable to cybercriminals.

Compromised accusation whitethorn include:

  • Names
  • Email addresses
  • Dates of birth
  • Genders
  • Approximate determination based connected ZIP codification oregon postcode
  • Purchase history

Researchers besides recovered email addresses belonging to Under Armour employees wrong the data. That increases the hazard of targeted phishing and concern email compromise scams.

Under Armour's effect truthful far

"We are alert of claims that an unauthorized 3rd enactment obtained definite data," an Under Armour spokesperson told CyberGuy. "Our probe of this issue, with the assistance of outer cybersecurity experts, is ongoing. Importantly, astatine this time, there's nary grounds to suggest this contented affected UA.com oregon systems utilized to process payments oregon store lawsuit passwords. Any accusation that delicate idiosyncratic accusation of tens of millions of customers has been compromised is unfounded. The information of our systems and information is simply a apical precedence for UA, and we instrumentality this contented precise seriously."

Why this breach matters

Even without passwords oregon outgo details, this breach inactive poses superior risks. Names, email addresses, commencement dates and acquisition past tin beryllium utilized to make highly convincing scams. Cybercriminals often notation existent purchases oregon relationship details to summation trust. As a result, phishing emails tied to this breach whitethorn look morganatic and urgent. Over time, exposed information similar this tin besides beryllium combined with different breaches to physique elaborate individuality profiles that are harder to support against.

How to cheque if your passwords were stolen

To spot if your email was affected, sojourn the Have I Been Pwned website. It is the archetypal and authoritative root for this recently added dataset. Enter your email code to find retired if your accusation appears successful the leak. When done, travel backmost present for Step 1 below.

Ways to enactment harmless aft the Under Armour information breach

If you received a breach alert oregon judge your accusation whitethorn beryllium included, taking enactment present tin trim your hazard later.

1) Change reused passwords and usage a password manager

If you reused the aforesaid password connected different sites, alteration those passwords close away. Even if Under Armour says passwords were not affected, exposed email addresses are often utilized successful follow-up attacks. A password manager makes this easier. It creates strong, unsocial passwords for each relationship and stores them securely. That way, 1 breach cannot unlock aggregate accounts.

woman moving   connected  budget

The leaked information reportedly includes email addresses, commencement dates and acquisition details, which tin beryllium exploited successful targeted phishing scams. (Kurt "CyberGuy" Knutsson)

Next, spot if your email has been exposed successful past breaches. Our No. 1 password manager prime includes a built-in breach scanner that checks whether your email code oregon passwords person appeared successful known leaks. If you observe a match, instantly alteration immoderate reused passwords and unafraid those accounts with new, unsocial credentials.

Check retired the champion expert-reviewed password managers of 2026 at Cyberguy.com.

2) Watch for phishing emails tied to Under Armour

Cybercriminals often determination accelerated aft a breach. As a result, emails that look to travel from Under Armour oregon fittingness brands whitethorn onshore successful your inbox. Be cautious of messages that assertion determination is an contented with your relationship oregon a caller purchase. Do not click links oregon unfastened attachments successful unexpected emails. Instead, spell straight to the company's authoritative website if you request to cheque your account. Using beardown antivirus bundle tin besides assistance artifact malicious links and attachments earlier they origin harm.

ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS' RECORDS

The champion mode to safeguard yourself from malicious links that instal malware, perchance accessing your backstage information, is to person beardown antivirus bundle installed connected each your devices. This extortion tin besides alert you to phishing emails and ransomware scams, keeping your idiosyncratic accusation and integer assets safe.

Get my picks for the champion 2026 antivirus extortion winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

3) Turn connected two-factor authentication everyplace you can

Two-factor authentication (2FA) adds an other furniture of protection. Even if idiosyncratic gets your password, they inactive request a 2nd measurement to log in. Turn it connected for email accounts first. Then alteration it for shopping, fittingness and fiscal accounts. This azygous measurement tin halt galore relationship takeover attempts linked to breached data.

4) Monitor for password reset attempts and relationship alerts

After a breach, attackers often trial stolen email addresses crossed aggregate sites. That enactment tin trigger password reset emails you did not request. Pay adjacent attraction to these alerts. If you spot one, unafraid the relationship instantly by changing the password and reviewing caller activity.

5) Be skeptical of messages that notation past purchases

This breach included acquisition information, which makes scams much convincing. Attackers whitethorn notation existent products oregon bid details to gain your trust. Treat immoderate connection that pressures you to enactment rapidly arsenic suspicious. Legitimate companies bash not request contiguous enactment by email oregon text.

6) Reduce your vulnerability with a information removal service

Over time, exposed idiosyncratic information often ends up with information brokers. These companies cod and merchantability profiles that scammers usage for targeting. A information removal work tin assistance you petition the deletion of your accusation from these databases. Reducing what is publically disposable makes it harder for criminals to physique elaborate profiles.

While nary work tin warrant the implicit removal of your information from the internet, a information removal work is truly a astute choice. They aren't cheap, and neither is your privacy. These services bash each the enactment for you by actively monitoring and systematically erasing your idiosyncratic accusation from hundreds of websites. It's what gives maine bid of caput and has proven to beryllium the astir effectual mode to erase your idiosyncratic information from the internet. By limiting the accusation available, you trim the hazard of scammers cross-referencing information from breaches with accusation they mightiness find connected the acheronian web, making it harder for them to people you.

Check retired my apical picks for information removal services and get a escaped scan to find retired if your idiosyncratic accusation is already retired connected the web by visiting Cyberguy.com.

Get a escaped scan to find retired if your idiosyncratic accusation is already retired connected the web: Cyberguy.com.

Under Armour Outdoor store   successful  China

Security experts pass that adjacent without outgo data, exposed idiosyncratic accusation tin substance fraud agelong aft a breach is discovered. (Cheng Xin/Getty Images)

Kurt's cardinal takeaways

The Under Armour information breach is simply a reminder that adjacent large planetary brands tin go targets. While outgo systems look unaffected, the vulnerability of idiosyncratic information inactive creates semipermanent risks for millions of customers. Data breaches often unfold implicit time. What starts arsenic leaked records tin aboriginal substance scams, individuality theft and targeted attacks. Staying alert present tin trim the accidental of bigger problems later.

If your idiosyncratic buying oregon fittingness information were exposed successful a breach similar this, would you support utilizing the marque oregon determination connected to a competitor? Let america cognize by penning to america astatine Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide – escaped erstwhile you articulation my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.  

Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.

Read Entire Article