ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Under Armour is obsessed with being better, stronger, and more focused than anyone else out there. Our mission: to make athletes better. Our vision: to inspire you with performance solutions you never knew you needed and can’t imagine living without. Our values define and unite us, the beliefs that are the red thread that connect everyone at Under Armour. Our values are rallying cries, reminding us why we’re here, and fueling everything we do. LOVE ATHLETES We believe in waking up every morning to make athletes legendary. From the best of the best to the ones just getting started, we put the athlete at the center of everything we do. We create fearlessly with the courage and conviction to defy convention. We innovate by taking bold and smart risks. We show up big where athletes train, compete, and recover. CELEBRATE THE WINS We believe our victories, big and small, bring us together as a team. We celebrate our accomplishments, giving credit where it's due. We take time to have fun. We channel past successes to inspire our next win. STAND FOR EQUALITY We believe sport is the great unifier. We don't sit on the sidelines; we speak up for fairness and equity. We treat each other with respect. We apply different perspectives in our work. We come together as a force for good to serve the communities we represent. ACT SUSTAINABLY We believe our work is not just what we do but how we do it. We work ethically and efficiently to perfect performance while reusing the Earth's resources. We seek new information to develop lasting solutions. We protect our planet for all who now play, and all who will play, on our home field. FIGHT ON TOGETHER We believe strength is built through tackling adversity. We act with an enterprise mindset in the best interest of the Brand. We help each other overcome obstacles. We act with integrity, have honest conversations and grow over mistakes. We approach challenges with positive intent and never quit.

Under Armour A.I CyberSecurity Scoring

Under Armour

Company Details

Linkedin ID:

under-armour

Employees number:

12,231

Number of followers:

934,816

NAICS:

448

Industry Type:

Retail Apparel and Fashion

Homepage:

underarmour.com

IP Addresses:

0

Company ID:

UND_8402120

Scan Status:

In-progress

AI scoreUnder Armour Risk Score (AI oriented)

Between 0 and 549

https://images.rankiteo.com/companyimages/under-armour.jpeg
Under Armour Retail Apparel and Fashion
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreUnder Armour Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/under-armour.jpeg
Under Armour Retail Apparel and Fashion
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Under Armour Company CyberSecurity News & History

Past Incidents
2
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Under ArmourRansomware100511/2025
Rankiteo Explanation :
Attack threatening the organization's existence

Description: The Everest Ransomware group executed a high-profile attack on Under Armour, exfiltrating **340 GB of sensitive data**, including **customer PII (email addresses, phone numbers, physical locations, passport details, gender info, purchase histories)** and **internal company data (product SKUs, marketing/sales strategies)**. The group employed **double extortion**, encrypting systems while threatening to sell the stolen data on the dark web if a **Monero (XMR) ransom** is not paid within **7 days**. The breach exposes Under Armour to severe risks: **identity theft, financial fraud, reputational damage**, and **competitive intelligence leaks**. The attack leverages **AES+DES encryption**, with Russian-language code suggesting geopolitical targeting avoidance. Under Armour’s silence on the incident heightens uncertainty, while the stolen data’s sensitivity—particularly **passport details and precise location data**—raises concerns over compliance violations and long-term customer trust erosion. The group’s shift from Bitcoin to **Monero** underscores its focus on evading law enforcement tracking, amplifying the threat’s sophistication.

Under ArmourRansomware10056/2023
Rankiteo Explanation :
Attack threatening the organization's existence

Description: The Everest ransomware group claimed responsibility for a cyberattack on sportswear retailer **Under Armour**, leaking a sample of stolen data on a dark web site. The hackers allege they exfiltrated **343GB of internal company data**, including **personally identifiable information (PII) of customers and employees**, such as email addresses, phone numbers, order histories, location data, and transaction records. The group demanded ransom negotiations within a **7-day deadline**, threatening further data exposure if unmet.The breach poses severe risks, including **identity theft, social engineering, and financial fraud** for affected customers. Under Armour has not yet publicly confirmed the incident, but the Everest group’s track record—with over **250 victims since 2023**, including high-profile disruptions like the **Dublin Airport supplier attack**—lends credibility to the claim. The leaked data’s sensitivity and scale suggest a **large-scale compromise of both customer and employee records**, heightening reputational, financial, and operational threats to the company.

Under Armour
Ransomware
Severity: 100
Impact: 5
Seen: 11/2025
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: The Everest Ransomware group executed a high-profile attack on Under Armour, exfiltrating **340 GB of sensitive data**, including **customer PII (email addresses, phone numbers, physical locations, passport details, gender info, purchase histories)** and **internal company data (product SKUs, marketing/sales strategies)**. The group employed **double extortion**, encrypting systems while threatening to sell the stolen data on the dark web if a **Monero (XMR) ransom** is not paid within **7 days**. The breach exposes Under Armour to severe risks: **identity theft, financial fraud, reputational damage**, and **competitive intelligence leaks**. The attack leverages **AES+DES encryption**, with Russian-language code suggesting geopolitical targeting avoidance. Under Armour’s silence on the incident heightens uncertainty, while the stolen data’s sensitivity—particularly **passport details and precise location data**—raises concerns over compliance violations and long-term customer trust erosion. The group’s shift from Bitcoin to **Monero** underscores its focus on evading law enforcement tracking, amplifying the threat’s sophistication.

Under Armour
Ransomware
Severity: 100
Impact: 5
Seen: 6/2023
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: The Everest ransomware group claimed responsibility for a cyberattack on sportswear retailer **Under Armour**, leaking a sample of stolen data on a dark web site. The hackers allege they exfiltrated **343GB of internal company data**, including **personally identifiable information (PII) of customers and employees**, such as email addresses, phone numbers, order histories, location data, and transaction records. The group demanded ransom negotiations within a **7-day deadline**, threatening further data exposure if unmet.The breach poses severe risks, including **identity theft, social engineering, and financial fraud** for affected customers. Under Armour has not yet publicly confirmed the incident, but the Everest group’s track record—with over **250 victims since 2023**, including high-profile disruptions like the **Dublin Airport supplier attack**—lends credibility to the claim. The leaked data’s sensitivity and scale suggest a **large-scale compromise of both customer and employee records**, heightening reputational, financial, and operational threats to the company.

Ailogo

Under Armour Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Under Armour

Incidents vs Retail Apparel and Fashion Industry Average (This Year)

Under Armour has 16.28% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Under Armour has 28.21% more incidents than the average of all companies with at least one recorded incident.

Incident Types Under Armour vs Retail Apparel and Fashion Industry Avg (This Year)

Under Armour reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — Under Armour (X = Date, Y = Severity)

Under Armour cyber incidents detection timeline including parent company and subsidiaries

Under Armour Company Subsidiaries

SubsidiaryImage

Under Armour is obsessed with being better, stronger, and more focused than anyone else out there. Our mission: to make athletes better. Our vision: to inspire you with performance solutions you never knew you needed and can’t imagine living without. Our values define and unite us, the beliefs that are the red thread that connect everyone at Under Armour. Our values are rallying cries, reminding us why we’re here, and fueling everything we do. LOVE ATHLETES We believe in waking up every morning to make athletes legendary. From the best of the best to the ones just getting started, we put the athlete at the center of everything we do. We create fearlessly with the courage and conviction to defy convention. We innovate by taking bold and smart risks. We show up big where athletes train, compete, and recover. CELEBRATE THE WINS We believe our victories, big and small, bring us together as a team. We celebrate our accomplishments, giving credit where it's due. We take time to have fun. We channel past successes to inspire our next win. STAND FOR EQUALITY We believe sport is the great unifier. We don't sit on the sidelines; we speak up for fairness and equity. We treat each other with respect. We apply different perspectives in our work. We come together as a force for good to serve the communities we represent. ACT SUSTAINABLY We believe our work is not just what we do but how we do it. We work ethically and efficiently to perfect performance while reusing the Earth's resources. We seek new information to develop lasting solutions. We protect our planet for all who now play, and all who will play, on our home field. FIGHT ON TOGETHER We believe strength is built through tackling adversity. We act with an enterprise mindset in the best interest of the Brand. We help each other overcome obstacles. We act with integrity, have honest conversations and grow over mistakes. We approach challenges with positive intent and never quit.

Loading...
similarCompanies

Under Armour Similar Companies

Ever since our founding by the brothers Clemens and August in 1841, C&A has been at the forefront of fashion. From making 'ready-to-wear'​ a thing when custom-made was the norm, to popularising miniskirts in the 60s, introducing the Com-bi-kini in the 70s, Bio Cotton in early 2000 and the first Crad

Crystal International

Founded in Hong Kong in 1970, Crystal International is one of the global leaders in the apparel manufacturing industry. We have a diversified product category in 6 segments: Lifestyle wear, Denim, Intimate, Sweater, Sportswear & Outdoor Apparel, and Knitted Fabrics. We operate a multi-country manufa

Bata Group

The Bata Group is one of the world's leading manufacturers and retailers of quality footwear. A global concern with more than 32,000 employees, 21 production facilities, over 5,300 stores in more than 70 countries across the globe, Bata has been providing the best shoes at the best prices, backed by

C&A Brasil

A C&A foi fundada em 1841 pelos irmãos holandeses Clemens e August. Suas iniciais deram origem ao nome da marca. Somamos mais de 1,8 mil unidades em 24 países da Europa, América Latina e Ásia e estamos entre as maiores redes de varejo do mundo. No Brasil, tudo começou em 1976, com a inauguração da

J.Crew

Since 1983, we’ve been designing pieces that feel both familiar and refreshingly new, crafted with unbeatable quality and distinctive point of view...it’s no wonder we’ve been in your closet for four decades and counting. Today, we continue to do the classics our way, inspiring not only how you sho

Tapestry

Our global house of brands unites the magic of Coach and Kate Spade New York. By intertwining different people and ideas, we push ourselves in our work and expand the bounds of possibility. Learn about our iconic brands: tapestry.com/our-brands We’ve grown by finding people dedicated to the dream a

URBN (Urban Outfitters, Anthropologie Group, Free People & Nuuly)

URBN Urban Outfitters, Inc. (www.urbn.com) is a portfolio of global consumer brands comprised of Anthropologie, Free People, FP Movement, Terrain, Urban Outfitters, Nuuly and Menus & Venues. At URBN, we Lead with Creativity…. Creativity guides our approach to product, environment, experience, and co

Coach

Coach was founded in 1941 as a family-run workshop. In a Manhattan loft, six artisans handcrafted a collection of leather goods using skills handed down from generation to generation. Discerning consumers soon began to seek out the quality and unique nature of Coach craftsmanship. Now greatly exp

Forever 21

Forever 21 continues to be a fashion industry leader with a mission to make the latest trends accessible to all. F21 persists on staying ahead of innovation and providing styles and fit that our customers love. While reinventing for now and beyond, we’re seeking passionate and creative new family me

newsone

Under Armour CyberSecurity News

November 21, 2025 02:31 AM
Cyber Security Agency of Singapore awards more than $16 million to 18 cybersecurity projects

The new funding will help support research, testing, and real-world implementation to help boost Singapore's growing cybersecurity ecosystem.

November 20, 2025 08:00 AM
Everest Ransomware Says It Breached Brazilian Energy Giant Petrobras

Everest ransomware group has listed two separate entries on its dark web leak site, both targeting Petrobras, a Brazilian majority...

November 18, 2025 08:00 AM
Everest Ransomware Group Allegedly Exposes 343 GB of Sensitive Data in Under Armour Breach

The Everest ransomware group has claimed responsibility for a significant cyber attack targeting Under Armour, alleging the theft of 343...

November 18, 2025 08:00 AM
Under Armor data breach by Everest Ransomware Group

The breach poses significant risks for Under Armour, particularly in light of the sensitive customer data that has reportedly been compromised.

November 18, 2025 08:00 AM
Everest Ransomware Group Allegedly Exposes 343 GB of Sensitive Data in Major Under Armour Breach

The notorious Everest ransomware group has claimed responsibility for a major cyber breach against Under Armour, the global sportswear giant...

November 18, 2025 08:00 AM
Everest ransomware gang claims breach of Under Armour

According to HackRead, the Everest ransomware gang has announced a breach of Under Armour, allegedly absconding with 343 GB of sensitive...

November 18, 2025 08:00 AM
Everest Ransomware Claims Under Armour Data Breach

The Everest ransomware group claims to have breached Under Armour, allegedly stealing 343 GB of customer and company data and issuing a...

November 17, 2025 08:00 AM
Everest Ransomware Says It Stole Data of Millions of Under Armour Users

Everest ransomware gang is claiming to have breached Under Armour, Inc., the American sportswear giant, and stolen 343 GB of internal...

October 09, 2025 07:00 AM
1Password Becomes the Official Cybersecurity Partner of the Utah Jazz and Utah Mammoth in a Multi-Year Agreement with Smith Entertainment Group

TORONTO & SALT LAKE CITY--(BUSINESS WIRE)--1Password, a leader in identity security and pioneer of Extended Access Management,...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Under Armour CyberSecurity History Information

Official Website of Under Armour

The official website of Under Armour is http://www.underarmour.com.

Under Armour’s AI-Generated Cybersecurity Score

According to Rankiteo, Under Armour’s AI-generated cybersecurity score is 529, reflecting their Critical security posture.

How many security badges does Under Armour’ have ?

According to Rankiteo, Under Armour currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Under Armour have SOC 2 Type 1 certification ?

According to Rankiteo, Under Armour is not certified under SOC 2 Type 1.

Does Under Armour have SOC 2 Type 2 certification ?

According to Rankiteo, Under Armour does not hold a SOC 2 Type 2 certification.

Does Under Armour comply with GDPR ?

According to Rankiteo, Under Armour is not listed as GDPR compliant.

Does Under Armour have PCI DSS certification ?

According to Rankiteo, Under Armour does not currently maintain PCI DSS compliance.

Does Under Armour comply with HIPAA ?

According to Rankiteo, Under Armour is not compliant with HIPAA regulations.

Does Under Armour have ISO 27001 certification ?

According to Rankiteo,Under Armour is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Under Armour

Under Armour operates primarily in the Retail Apparel and Fashion industry.

Number of Employees at Under Armour

Under Armour employs approximately 12,231 people worldwide.

Subsidiaries Owned by Under Armour

Under Armour presently has no subsidiaries across any sectors.

Under Armour’s LinkedIn Followers

Under Armour’s official LinkedIn profile has approximately 934,816 followers.

NAICS Classification of Under Armour

Under Armour is classified under the NAICS code 448, which corresponds to Clothing and Clothing Accessories Stores.

Under Armour’s Presence on Crunchbase

No, Under Armour does not have a profile on Crunchbase.

Under Armour’s Presence on LinkedIn

Yes, Under Armour maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/under-armour.

Cybersecurity Incidents Involving Under Armour

As of December 14, 2025, Rankiteo reports that Under Armour has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

Under Armour has an estimated 4,917 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Under Armour ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.

Incident Details

Can you provide details on each incident ?

Incident : data breach

Title: Under Armour Data Breach by Everest Ransomware Group

Description: The Everest ransomware group claimed responsibility for breaching Under Armour, posting a sample of stolen data (allegedly over millions of personal records and 343GB of internal company data) on a dark web leak site. The breach includes personally identifiable information (PII) of customers and employees, such as email addresses, phone numbers, order histories, location data, and transaction data. The group has given Under Armour a 7-day ultimatum to negotiate a ransom, threatening further data leaks if demands are not met.

Type: data breach

Threat Actor: Everest ransomware group

Motivation: financial (ransom extortion)

Incident : Data Breach

Title: Everest Ransomware Attack on Under Armour

Description: The Everest Ransomware group claimed responsibility for a massive data breach involving Under Armour, stealing 340 GB of sensitive data. The group demanded a ransom in Monero (XMR) with a seven-day deadline, threatening to sell the data on the dark web if unpaid. Compromised data includes personal identification information (email addresses, phone numbers, physical location data), sensitive documents (passport details, gender information, purchase histories), and internal company data (product SKUs, marketing, and sales data). The attack highlights potential security gaps in Under Armour's data handling practices.

Type: Data Breach

Threat Actor: Everest Ransomware Group

Motivation: Financial GainData Theft for Dark Web Sale

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident ?

Incident : data breach UND3992039111825

Data Compromised: Personally identifiable information (pii), Internal company documents, Email addresses, Phone numbers, Order histories, Location data, Transaction data

Brand Reputation Impact: high (potential loss of trust due to exposure of sensitive customer/employee data)

Identity Theft Risk: high (customers at risk of identity theft, social engineering, and fraud)

Incident : Data Breach UND3492734111825

Brand Reputation Impact: High (potential severe damage due to sensitive data exposure and internal business strategy leaks)

Identity Theft Risk: High (due to exposure of PII, passport details, and location data)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Pii (Customers And Employees), Internal Company Documents, , Personal Identification Information (Pii): Email Addresses, Phone Numbers, Physical Location Data, Sensitive Documents: Passport Details, Gender Information, Purchase Histories, Internal Company Data: Product Skus, Marketing Data, Sales Data and .

Which entities were affected by each incident ?

Incident : data breach UND3992039111825

Entity Name: Under Armour

Entity Type: retailer (sportswear manufacturer and retailer)

Industry: apparel and accessories

Location: United States (global operations)

Customers Affected: potentially thousands (exact number undisclosed)

Incident : Data Breach UND3492734111825

Entity Name: Under Armour

Entity Type: Corporation

Industry: Apparel/Retail

Location: United States

Size: Large (global enterprise)

Data Breach Information

What type of data was compromised in each breach ?

Incident : data breach UND3992039111825

Type of Data Compromised: Pii (customers and employees), Internal company documents

Number of Records Exposed: millions (exact number undisclosed, 343GB of data exfiltrated)

Sensitivity of Data: high (includes personal and transactional data)

Personally Identifiable Information: email addressesphone numbersorder historieslocation datatransaction data

Incident : Data Breach UND3492734111825

Type of Data Compromised: Personal identification information (pii): email addresses, phone numbers, physical location data, Sensitive documents: passport details, gender information, purchase histories, Internal company data: product skus, marketing data, sales data

Sensitivity of Data: High (includes PII, passport details, and internal business data)

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : data breach UND3992039111825

Ransomware Strain: Everest

Data Exfiltration: True

Incident : Data Breach UND3492734111825

Ransom Demanded: {'currency': 'Monero (XMR)', 'amount': None, 'deadline': '7 days from announcement'}

Ransomware Strain: Everest Ransomware (evolved from BlackByte family)

Data Encryption: {'methods': ['AES (Advanced Encryption Standard)', 'DES (Data Encryption Standard)'], 'language': 'Russian (encryption code)'}

Data Exfiltration: True

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Data Breach UND3492734111825

Lessons Learned: Ransomware groups are evolving with double extortion tactics (encryption + data theft)., Use of privacy-focused cryptocurrencies (e.g., Monero) complicates ransom tracing., Companies must reassess data storage practices, especially for highly sensitive PII (e.g., passport details)., Geopolitical motivations may influence target selection (e.g., avoidance of Russian-speaking regions)., Public silence post-breach can exacerbate reputational and operational risks.

What recommendations were made to prevent future incidents ?

Incident : data breach UND3992039111825

Recommendations: Customers should monitor accounts for suspicious activity (identity theft, fraud)., Use identity theft protection software if concerned., Exercise caution with unexpected communications (e.g., phishing emails/texts)., Verify sender authenticity (e.g., check for spoofed domains like 'gma1l' instead of 'gmail').Customers should monitor accounts for suspicious activity (identity theft, fraud)., Use identity theft protection software if concerned., Exercise caution with unexpected communications (e.g., phishing emails/texts)., Verify sender authenticity (e.g., check for spoofed domains like 'gma1l' instead of 'gmail').Customers should monitor accounts for suspicious activity (identity theft, fraud)., Use identity theft protection software if concerned., Exercise caution with unexpected communications (e.g., phishing emails/texts)., Verify sender authenticity (e.g., check for spoofed domains like 'gma1l' instead of 'gmail').Customers should monitor accounts for suspicious activity (identity theft, fraud)., Use identity theft protection software if concerned., Exercise caution with unexpected communications (e.g., phishing emails/texts)., Verify sender authenticity (e.g., check for spoofed domains like 'gma1l' instead of 'gmail').

Incident : Data Breach UND3492734111825

Recommendations: Implement robust encryption for stored sensitive data (e.g., PII, internal documents)., Adopt multi-layered ransomware defenses, including behavioral analysis and anomaly detection., Develop and test incident response plans specifically for double extortion scenarios., Monitor dark web for leaked data and proactively notify affected customers., Conduct third-party audits of data handling practices to identify unnecessary storage of high-risk information., Evaluate cryptocurrency transaction monitoring tools to detect ransom payments or dark web sales., Enhance employee training on phishing and social engineering, common initial access vectors for ransomware.Implement robust encryption for stored sensitive data (e.g., PII, internal documents)., Adopt multi-layered ransomware defenses, including behavioral analysis and anomaly detection., Develop and test incident response plans specifically for double extortion scenarios., Monitor dark web for leaked data and proactively notify affected customers., Conduct third-party audits of data handling practices to identify unnecessary storage of high-risk information., Evaluate cryptocurrency transaction monitoring tools to detect ransom payments or dark web sales., Enhance employee training on phishing and social engineering, common initial access vectors for ransomware.Implement robust encryption for stored sensitive data (e.g., PII, internal documents)., Adopt multi-layered ransomware defenses, including behavioral analysis and anomaly detection., Develop and test incident response plans specifically for double extortion scenarios., Monitor dark web for leaked data and proactively notify affected customers., Conduct third-party audits of data handling practices to identify unnecessary storage of high-risk information., Evaluate cryptocurrency transaction monitoring tools to detect ransom payments or dark web sales., Enhance employee training on phishing and social engineering, common initial access vectors for ransomware.Implement robust encryption for stored sensitive data (e.g., PII, internal documents)., Adopt multi-layered ransomware defenses, including behavioral analysis and anomaly detection., Develop and test incident response plans specifically for double extortion scenarios., Monitor dark web for leaked data and proactively notify affected customers., Conduct third-party audits of data handling practices to identify unnecessary storage of high-risk information., Evaluate cryptocurrency transaction monitoring tools to detect ransom payments or dark web sales., Enhance employee training on phishing and social engineering, common initial access vectors for ransomware.Implement robust encryption for stored sensitive data (e.g., PII, internal documents)., Adopt multi-layered ransomware defenses, including behavioral analysis and anomaly detection., Develop and test incident response plans specifically for double extortion scenarios., Monitor dark web for leaked data and proactively notify affected customers., Conduct third-party audits of data handling practices to identify unnecessary storage of high-risk information., Evaluate cryptocurrency transaction monitoring tools to detect ransom payments or dark web sales., Enhance employee training on phishing and social engineering, common initial access vectors for ransomware.Implement robust encryption for stored sensitive data (e.g., PII, internal documents)., Adopt multi-layered ransomware defenses, including behavioral analysis and anomaly detection., Develop and test incident response plans specifically for double extortion scenarios., Monitor dark web for leaked data and proactively notify affected customers., Conduct third-party audits of data handling practices to identify unnecessary storage of high-risk information., Evaluate cryptocurrency transaction monitoring tools to detect ransom payments or dark web sales., Enhance employee training on phishing and social engineering, common initial access vectors for ransomware.Implement robust encryption for stored sensitive data (e.g., PII, internal documents)., Adopt multi-layered ransomware defenses, including behavioral analysis and anomaly detection., Develop and test incident response plans specifically for double extortion scenarios., Monitor dark web for leaked data and proactively notify affected customers., Conduct third-party audits of data handling practices to identify unnecessary storage of high-risk information., Evaluate cryptocurrency transaction monitoring tools to detect ransom payments or dark web sales., Enhance employee training on phishing and social engineering, common initial access vectors for ransomware.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Ransomware groups are evolving with double extortion tactics (encryption + data theft).,Use of privacy-focused cryptocurrencies (e.g., Monero) complicates ransom tracing.,Companies must reassess data storage practices, especially for highly sensitive PII (e.g., passport details).,Geopolitical motivations may influence target selection (e.g., avoidance of Russian-speaking regions).,Public silence post-breach can exacerbate reputational and operational risks.

References

Where can I find more information about each incident ?

Incident : data breach UND3992039111825

Source: TechRadar Pro

Incident : data breach UND3992039111825

Source: Cybernews

Incident : Data Breach UND3492734111825

Source: Cybersecurity News Report (hypothetical, based on incident description)

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: TechRadar Pro, and Source: Cybernews, and Source: Cybersecurity News Report (hypothetical, based on incident description).

Investigation Status

What is the current status of the investigation for each incident ?

Incident : data breach UND3992039111825

Investigation Status: unconfirmed (Under Armour has not publicly responded)

Incident : Data Breach UND3492734111825

Investigation Status: Ongoing (no public confirmation or details from Under Armour as of report)

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : data breach UND3992039111825

Customer Advisories: Monitor accounts for fraud/identity theft.Be wary of social engineering attempts (e.g., phishing).

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Monitor Accounts For Fraud/Identity Theft., Be Wary Of Social Engineering Attempts (E.G., Phishing). and .

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : data breach UND3992039111825

High Value Targets: Customer Pii, Internal Company Documents,

Data Sold on Dark Web: Customer Pii, Internal Company Documents,

Incident : Data Breach UND3492734111825

High Value Targets: Customer Databases, Internal Marketing/Sales Data,

Data Sold on Dark Web: Customer Databases, Internal Marketing/Sales Data,

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach UND3492734111825

Root Causes: Potential Inadequate Data Encryption Or Access Controls For Sensitive Pii., Possible Lack Of Segmentation Between Customer Data And Internal Business Systems., Unclear Initial Access Vector (E.G., Phishing, Unpatched Vulnerability, Or Insider Threat).,

Additional Questions

General Information

What was the amount of the last ransom demanded ?

Last Ransom Demanded: The amount of the last ransom demanded was {'currency': 'Monero (XMR)', 'amount': None, 'deadline': '7 days from announcement'}.

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an Everest ransomware group and Everest Ransomware Group.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were personally identifiable information (PII), internal company documents, email addresses, phone numbers, order histories, location data, transaction data, and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were transaction data, internal company documents, location data, email addresses, personally identifiable information (PII), phone numbers and order histories.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 343.0.

Ransomware Information

What was the highest ransom demanded in a ransomware incident ?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was {'currency': 'Monero (XMR)', 'amount': None, 'deadline': '7 days from announcement'}.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Public silence post-breach can exacerbate reputational and operational risks.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Monitor dark web for leaked data and proactively notify affected customers., Customers should monitor accounts for suspicious activity (identity theft, fraud)., Exercise caution with unexpected communications (e.g., phishing emails/texts)., Conduct third-party audits of data handling practices to identify unnecessary storage of high-risk information., Use identity theft protection software if concerned., Develop and test incident response plans specifically for double extortion scenarios., Verify sender authenticity (e.g., check for spoofed domains like 'gma1l' instead of 'gmail')., Adopt multi-layered ransomware defenses, including behavioral analysis and anomaly detection., Enhance employee training on phishing and social engineering, common initial access vectors for ransomware., Implement robust encryption for stored sensitive data (e.g., PII, internal documents). and Evaluate cryptocurrency transaction monitoring tools to detect ransom payments or dark web sales..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Cybernews, Cybersecurity News Report (hypothetical, based on incident description) and TechRadar Pro.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is unconfirmed (Under Armour has not publicly responded).

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Monitor accounts for fraud/identity theft.Be wary of social engineering attempts (e.g. and phishing).

cve

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=under-armour' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge