Everest Ransomware Gang Claims McDonald’s India Data Theft

Related

Pentagon CIO Kirsten Davies Announces New Team Appointments

What happened Pentagon Chief Information Officer Kirsten Davies announced several...

Carnival Corporation Probes Data Breach After Claims of 8.7 Million Records Theft

What happened Carnival Corporation is investigating a potential data breach...

Grinex Exchange Blames Western Intelligence for $13.7M Crypto Hack

What happened Kyrgyzstan-based cryptocurrency exchange Grinex suspended operations on April...

Payouts King Ransomware Uses QEMU VMs to Bypass Endpoint Security

What happened Sophos researchers have documented two active campaigns in...

Share

What happened

The Everest ransomware gang claims a McDonald’s India breach on January 20, 2026, saying it exfiltrated 861 GB of data and posted the allegation to its leak site. The group said the stolen material includes internal documents and customer personal data, and it threatened to publish the data if McDonald’s India does not respond within its stated deadline. The report notes McDonald’s India operates through Connaught Plaza Restaurants (North and East India) and Hardcastle Restaurants (West and South India). The incident is described as data-theft-led extortion, where attackers focus on stealing information and using publication pressure rather than only encrypting systems. The report also describes Everest as a Russian-speaking operation active since 2020, associated with “pure extortion” tactics.

Who is affected

McDonald’s India and its operating entities Connaught Plaza Restaurants and Hardcastle Restaurants are directly impacted if the claimed data theft is accurate. Potential exposure involves internal business documents and customer personal data tied to India operations. Downstream risk is indirect for customers and partners whose information may be included in the dataset.

Why CISOs should care

Large-scale data-theft extortion creates material regulatory, reputational, and customer-trust impact even without confirmed encryption. If internal documents and customer records are involved, the incident can accelerate phishing and fraud campaigns and complicate breach response across multiple legal entities and regions, raising operational and communications complexity.

3 practical actions

  • Validate data-exfiltration claims quickly: Correlate logs, DLP alerts, and egress telemetry to confirm whether unusual outbound transfers align with the alleged 861 GB theft window.

  • Contain likely initial access and persistence: Rotate exposed credentials, review remote access pathways, and isolate systems showing suspicious admin activity tied to potential exfiltration workflows.

  • Prepare customer and regulator response workflows: Inventory potentially affected data domains and align legal, privacy, and communications teams on notification triggers and evidence requirements.