Flash Report: Everest Continues to Tout Prominent Brands in Latest Disclosures
by ZeroFox Intelligence
Key Findings
- On February 2, 2026, a ransomware and digital extortion (R&DE) collective known as “Everest” announced an alleged data breach of Iron Mountain on its victim leak site. ZeroFox assesses Everest has very likely overstated the volume and sensitivity of the breach in order to increase pressure on the victim to comply with its extortion demands.
- Everest is a Russian-language collective offering ransomware-as-a-service (RaaS) that has conducted at least 286 separate R&DE incidents since ZeroFox first observed the group in 2021. In light of sensitive reporting, ZeroFox assesses Everest has likely exaggerated the quantity and quality of its alleged victim data—and in some cases fabricated it entirely.
- Everest is the tenth most prominent R&DE collective thus far in 2026 in terms of number of published alleged victims; the group has primarily targeted North America-based entities and organizations in the healthcare sector. However, given Everest’s historical tendency to overstate its exfiltrations, ZeroFox assesses it is unlikely their latest claims regarding the Iron Mountain breach are credible.
Details
On February 2, 2026, R&DE collective Everest published an alleged data breach of Iron Mountain, a U.S.-based data storage and recovery services company, on its victim leak site. ZeroFox assesses that Everest has very likely overstated the volume and sensitivity of this alleged breach in an attempt to increase pressure on Iron Mountain to comply with its extortion demands.
- Everest announced the data breach on its victim leak site, claiming to have exfiltrated 1.4 terabytes of internal personal documents and information on the company’s clients.
- Despite the collective's claims, Iron Mountain’s press release regarding a “cybersecurity issue” stated that only one folder with marketing materials was accessed via compromised login credentials.1
Everest is a Russian-language collective offering RaaS that has conducted at least 286 separate R&DE incidents since ZeroFox first observed the group in 2021. In light of sensitive reporting, ZeroFox assesses that Everest has historically likely exaggerated the quantity and quality of its alleged victim data—and in some cases fabricated it entirely. The group is known for its hybrid RaaS model incorporating ransomware and initial access broker (IAB) services with insider recruitment programs.2 According to U.S. Health Sector Cybersecurity Coordination Center (HC3) security researchers, Everest is linked to the “EverBe 2.0” ransomware family and the Russia-based ransomware group known as “BlackByte”.3
Since February 2021, Everest has disproportionately targeted North-America based organizations, which represent nearly 53 percent of the collective’s victims. Everest’s targeting is largely consistent with regional trends collective-wide. Notably, Everest’s industry-based targeting is predominantly focused on the healthcare sector, followed by technology, manufacturing, and financial services. Everest’s attack tempo has increased so far this calendar year, making the collective the tenth most prominent R&DE collective year-to-date (YTD); the group has claimed responsibility for at least 25 separate R&DE incidents so far in 2026.
Given Everest’s historical tendency to overstate its exfiltrations, ZeroFox assesses it is unlikely their latest claims regarding the Iron Mountain breach are credible and very likely that the collective will continue to exaggerate their claims—especially until their other alleged victims disclose the severity of the incidents. Since a majority of Everest’s leak site announcements do not offer distinct indicators of compromise, there is a roughly even chance the collective’s attacks are either ransomware-based or merely extortion attempts.
Recommendations
- Develop a comprehensive incident response strategy.
- Deploy a holistic patch management process, and ensure all IT assets are patched with the latest software updates as quickly as possible.
- Adopt a Zero-Trust cybersecurity architecture based upon a principle of least privilege.
- Implement network segmentation to separate resources by sensitivity and/or function.
- Ensure critical, proprietary, or sensitive data is always backed up to secure, off-site, or cloud servers at least once per year—and ideally more frequently.
- Implement secure password policies, phishing-resistant multi-factor authentication (MFA), and unique credentials.
- Configure email servers to block emails with malicious indicators, and deploy authentication protocols to prevent spoofed emails.
- Proactively monitor for compromised accounts and credentials being brokered in deep and dark web (DDW) forums.
- Leverage cyber threat intelligence to inform the detection of relevant cyber threats and associated tactics, techniques, and procedures (TTPs).
Scope Note
ZeroFox Intelligence is derived from a variety of sources, including—but not limited to—curated open-source accesses, vetted social media, proprietary data sources, and direct access to threat actors and groups through covert communication channels. Information relied upon to complete any report cannot always be independently verified. As such, ZeroFox applies rigorous analytic standards and tradecraft in accordance with best practices and includes caveat language and source citations to clearly identify the veracity of our Intelligence reporting and substantiate our assessments and recommendations. All sources used in this particular Intelligence product were identified prior to 9:00 AM (EST) on February 6, 2026; per cyber hygiene best practices, caution is advised when clicking on any third-party links.
ZeroFox Intelligence Probability Scale
All ZeroFox intelligence products leverage probabilistic assessment language in analytic judgments. Qualitative statements used in these judgments refer to associated probability ranges, which state the likelihood of occurrence of an event or development. Ranges are used to avoid a false impression of accuracy. This scale is a standard that aligns with how readers should interpret such terms.
- hXXps://www.ironmountain[.]com/about-us/media-center/press-releases/2026/february/iron-mountain-statement-cybersecurity-issue
- hXXps://www.halcyon[.]ai/threat-group/everest#introduction
- hXXps://www.hipaajournal[.]com/wp-content/uploads/2024/08/hhs-hc3-everest-ransomware-group-threat-profile-aug-2024.pdf