Dan Morgan
“The Fee is Free unless you win.”
Dan Morgan Managing Partner

Under Armour Data Breach

A data breach involving Under Armour may have exposed the personal information of millions of users. If your data was compromised, you may have legal options to pursue a claim and protect yourself from identity theft and fraud.

See if you qualify

The attorney shown above may not be licensed in your state. To find an attorney licensed in your area, please visit our attorney page.

Dan Morgan
“The Fee is Free unless you win.”
Dan Morgan Managing Partner

The attorney shown above may not be licensed in your state. To find an attorney licensed in your area, please visit our attorney page.

    Meet Our Under Armour Data Breach Attorney

    From investigation to resolution, our attorneys handle every aspect of weight loss drug claims. You focus on your health, we’ll fight to hold the responsible parties accountable.

    The attorneys shown in these photos may not be licensed in your state. To find an attorney licensed in your area, please visit our attorney page.

    Under Armour Data Breach at a Glance

    Types of Data Potentially Exposed

    Based on publicly reported information, compromised data may have included full names, email addresses, dates of birth, gender, and location data such as ZIP codes.

    Ransomware Attack Allegations

    Reports indicate that a ransomware group may have accessed and exfiltrated a significant volume of data before allegedly publishing it online after a ransom demand was not met.

    Impact Varies by Individual

    Not every individual was affected in the same way, as the specific data exposed depends on the information associated with each Under Armour account.

    Proven Experience, Powerful Results

    With 35+ years, billions recovered, and a nationwide team of attorneys, we bring the trial strength and dedication needed to take on complex data breach and privacy cases.

    Results may vary depending on your particular facts and legal circumstances.

    Do I Have a Case?

    Had an Under Armour Account or Used Its Services

    You had an account or used Under Armour services when the breach occurred, and your personal information may have been exposed.

    Identity Theft, Fraud, or Suspicious Activity

    You experienced, or could be at risk for, identity theft, fraud, or other unusual activity linked to the breach.

    Time, Effort, or Legal Risk from Data Exposure

    You spent time or money protecting your accounts or credit, and even without financial loss, the exposure of personal information may create ongoing risks and potential legal harm.

    In Their Words

    Real clients share their experience.

    When it came to negotiating, they didn't just settle for anything. They definitely went to the bat for me.

    Lashondra
    lashondra
    Wistia

    They took care of me, and now we're doing okay. Thank God that I went to Morgan & Morgan.

    Ray
    Video thumbnail for ordsi98jme
    Wistia

    The company handled absolutely everything from start to finish.

    Sean
    image of sean
    Wistia

    Lashondra

    lashondra

    Ray

    Video thumbnail for ordsi98jme

    Sean

    image of sean
    Results may vary depending on your particular facts and legal circumstances.
    Based on select nationwide reviews.
    downloadable

    Unsure If We Can Help?

    Data breaches can have delayed impacts, and many only realize the risk when their information is misused. A free case evaluation can determine if you were affected by the Under Armour breach and what legal options are available.

    Fighting For the People

    Backed by America’s Largest Injury Law Firm.

    • $30 Billion
      Recovered for clients
      nationwide
    • 700,000+
      Clients and families
      served
    • 1,000+
      Attorneys across
      the country
    • 1
      Click may change your life
    Your case isn't just another file to us. It's your life, your future, and your family. And we take that personally.
    Dan Morgan
    Managing Partner, Morgan & Morgan
    Read Bio
    Dan Morgan

    The attorney featured above is licensed in Florida. For a full list of attorneys in your state please visit our attorney page.
    Results may vary depending on your particular facts and legal circumstances.

    Ways We Can Help: What Compensation May Cover

    Out-of-Pocket Financial Losses

    Unauthorized transactions, fraudulent charges, or financial account misuse tied to the breach.

    Credit Monitoring & Identity Protection Costs

    Expenses related to credit freezes, monitoring services, identity restoration, and fraud prevention.

    Time and Effort Spent Responding

    Time spent securing accounts, disputing fraudulent activity, or addressing credit issues.

    Future Risk and Preventive Measures

    Ongoing monitoring and protection may be required due to long-term exposure of personal information.

    Emotional Distress and Anxiety

    Stress, disruption, and loss of privacy, caused by the exposure of sensitive data.

    Common Harms Linked to Data Breaches

    Identity theft and impersonation

    Your personal information could be used to steal your identity or pretend to be you.

    Phishing attacks and targeted scams

    You may be more likely to receive phishing emails or other scams aimed at tricking you.

    Unauthorized account access

    Someone could access your accounts without your permission.

    Compromised credit and financial instability

    Your credit or finances could be affected, causing potential financial problems.

    Loss of privacy and control over personal data

    You may lose control over how your personal information is shared or used.

    Increased risk of future fraud

    Your information could make you more vulnerable to fraud in the future.

    Learn More

    Injured and not sure what to do next?
    We'll guide you through everything you need to know.

    FAQ
    Reviewed by U. Seth Ottensoser, Attorney at Morgan & Morgan, on March 30, 2026.
    • What information may have been exposed?

      Based on publicly reported information, the data involved in the Under Armour breach may include personal identifying details such as names, email addresses, dates of birth, gender, and location data like ZIP codes.

      While this may not include financial account numbers in all cases, even basic personal information can be used in targeted phishing attempts, identity theft, and other forms of fraud. Not everyone was impacted in the same way, but any exposure can create ongoing risk.

    • What if I haven’t experienced fraud yet?

      Many people affected by data breaches do not experience immediate fraud. Stolen information is often sold or shared and may be used months or even years later.

      Even without current misuse, individuals may still face harm through increased risk, the need for monitoring, and the time and stress involved in protecting their identity and accounts.

    • How do I know if I was affected?

      Under Armour may notify certain users whose information was involved in the breach. If you received a notice, your data may have been exposed.

      However, some people may be unsure whether their information was affected or what type of data was involved. A case review can help evaluate your situation based on your account and the information associated with it.

    • How will I know if Under Armour notifies me about the breach?

      Companies typically notify affected individuals by email or postal mail, and notifications may be sent in stages.

      Check the email associated with your account, including spam or junk folders, and monitor your physical mail. If you receive a notice, keep a copy for your records.

    • Can I still pursue a claim if credit monitoring was offered?

      Yes. Credit monitoring services are designed to alert individuals to suspicious activity, but they do not prevent identity theft or stop misuse of exposed data.

      Accepting these services does not eliminate the risks associated with a data breach or prevent individuals from pursuing legal claims related to the exposure of their information.

    • What is mass arbitration, and how is it different from a class action?

      Mass arbitration is a legal process where many individuals bring similar claims against a company, but each claim is handled separately through arbitration rather than as part of a single class action case.

      This approach can allow individuals to pursue their own claims while still holding companies accountable for widespread data breaches. The process and potential outcomes can vary depending on the specific circumstances of each claim.

    • What kind of damages can data breach claims involve?

      Data breach claims may involve more than direct financial losses. They can include costs related to credit protection, time spent securing accounts, addressing fraudulent activity, and managing ongoing risk.

      In some cases, individuals may also experience stress or anxiety related to the loss of privacy and the uncertainty of how their information may be used.

    • Do I need proof of identity theft to pursue a claim?

      Not necessarily. In many data breach cases, harm can exist even before fraud occurs.

      The exposure of personal information can create measurable risk, require preventive action, and lead to ongoing concern. Whether proof of misuse is required depends on the specific facts of the situation.

    • What steps should I take after a data breach?

      If your information may have been exposed, taking early action can help reduce risk. Common steps include monitoring financial accounts, placing fraud alerts or credit freezes, updating passwords, and staying alert for phishing attempts.

      Even if no misuse has occurred, preventive measures can be important after a breach.

    Scroll down for more
    Reviewed by U. Seth Ottensoser, Attorney at Morgan & Morgan, on March 30, 2026.