Under Armour Data Breach
A data breach involving Under Armour may have exposed the personal information of millions of users. If your data was compromised, you may have legal options to pursue a claim and protect yourself from identity theft and fraud.
See if you qualifyThe attorney shown above may not be licensed in your state. To find an attorney licensed in your area, please visit our attorney page.
The attorney shown above may not be licensed in your state. To find an attorney licensed in your area, please visit our attorney page.
Meet Our Under Armour Data Breach Attorney
From investigation to resolution, our attorneys handle every aspect of weight loss drug claims. You focus on your health, we’ll fight to hold the responsible parties accountable.
The attorneys shown in these photos may not be licensed in your state. To find an attorney licensed in your area, please visit our attorney page.
Under Armour Data Breach at a Glance
Types of Data Potentially Exposed
Ransomware Attack Allegations
Impact Varies by Individual
Proven Experience, Powerful Results
Results may vary depending on your particular facts and legal circumstances.
Do I Have a Case?
Had an Under Armour Account or Used Its Services
Identity Theft, Fraud, or Suspicious Activity
Time, Effort, or Legal Risk from Data Exposure
In Their Words
Based on select nationwide reviews.
Unsure If We Can Help?
Data breaches can have delayed impacts, and many only realize the risk when their information is misused. A free case evaluation can determine if you were affected by the Under Armour breach and what legal options are available.
Fighting For the People
Backed by America’s Largest Injury Law Firm.
$30 Billion
Recovered for clients
nationwide700,000+
Clients and families
served1,000+
Attorneys across
the country1
Click may change your life
The attorney featured above is licensed in Florida. For a full list of attorneys in your state please visit our attorney page.
Results may vary depending on your particular facts and legal circumstances.
Ways We Can Help: What Compensation May Cover
Out-of-Pocket Financial Losses
Credit Monitoring & Identity Protection Costs
Time and Effort Spent Responding
Future Risk and Preventive Measures
Emotional Distress and Anxiety
Common Harms Linked to Data Breaches
Identity theft and impersonation
Phishing attacks and targeted scams
Unauthorized account access
Compromised credit and financial instability
Loss of privacy and control over personal data
Increased risk of future fraud
Learn More
Injured and not sure what to do next?
We'll guide you through everything you need to know.
What information may have been exposed?
Based on publicly reported information, the data involved in the Under Armour breach may include personal identifying details such as names, email addresses, dates of birth, gender, and location data like ZIP codes.
While this may not include financial account numbers in all cases, even basic personal information can be used in targeted phishing attempts, identity theft, and other forms of fraud. Not everyone was impacted in the same way, but any exposure can create ongoing risk.
What if I haven’t experienced fraud yet?
Many people affected by data breaches do not experience immediate fraud. Stolen information is often sold or shared and may be used months or even years later.
Even without current misuse, individuals may still face harm through increased risk, the need for monitoring, and the time and stress involved in protecting their identity and accounts.
How do I know if I was affected?
Under Armour may notify certain users whose information was involved in the breach. If you received a notice, your data may have been exposed.
However, some people may be unsure whether their information was affected or what type of data was involved. A case review can help evaluate your situation based on your account and the information associated with it.
How will I know if Under Armour notifies me about the breach?
Companies typically notify affected individuals by email or postal mail, and notifications may be sent in stages.
Check the email associated with your account, including spam or junk folders, and monitor your physical mail. If you receive a notice, keep a copy for your records.
Can I still pursue a claim if credit monitoring was offered?
Yes. Credit monitoring services are designed to alert individuals to suspicious activity, but they do not prevent identity theft or stop misuse of exposed data.
Accepting these services does not eliminate the risks associated with a data breach or prevent individuals from pursuing legal claims related to the exposure of their information.
What is mass arbitration, and how is it different from a class action?
Mass arbitration is a legal process where many individuals bring similar claims against a company, but each claim is handled separately through arbitration rather than as part of a single class action case.
This approach can allow individuals to pursue their own claims while still holding companies accountable for widespread data breaches. The process and potential outcomes can vary depending on the specific circumstances of each claim.
What kind of damages can data breach claims involve?
Data breach claims may involve more than direct financial losses. They can include costs related to credit protection, time spent securing accounts, addressing fraudulent activity, and managing ongoing risk.
In some cases, individuals may also experience stress or anxiety related to the loss of privacy and the uncertainty of how their information may be used.
Do I need proof of identity theft to pursue a claim?
Not necessarily. In many data breach cases, harm can exist even before fraud occurs.
The exposure of personal information can create measurable risk, require preventive action, and lead to ongoing concern. Whether proof of misuse is required depends on the specific facts of the situation.
What steps should I take after a data breach?
If your information may have been exposed, taking early action can help reduce risk. Common steps include monitoring financial accounts, placing fraud alerts or credit freezes, updating passwords, and staying alert for phishing attempts.
Even if no misuse has occurred, preventive measures can be important after a breach.


