The Everest ransomware group has claimed responsibility for a significant data breach involving systems associated with Polycom, a brand now fully integrated into HP Inc.. According to the group’s statements posted on its dark web leak site, it alleges to have obtained approximately 90 GB of internal data, including a database and internal company documentation. Everest has threatened to publish this data after a nine-day countdown unless its demands are met.
In support of its claims, Everest has released a series of screenshots that purportedly demonstrate access to Polycom’s internal systems. The images appear to show internal file directories, engineering build environments, source code trees, and software logs, as well as technical documentation related to Polycom’s conferencing platforms, including the RMX and RealPresence systems. Notably, the screenshots do not display any customer personal data or sensitive user information. The material published seems focused on product development, internal testing, and infrastructure components rather than consumer-facing services.
Corporate Background on Polycom
Polycom has undergone numerous corporate transitions in recent years. The company was acquired by Plantronics in 2018, rebranded as Poly in 2019, and later acquired by HP Inc. in 2022. Since this acquisition, Poly’s products and services have been consolidated under the HP umbrella. The legacy Polycom and Poly domains now redirect to HP-managed platforms, further integrating the brand’s offerings within HP’s extensive portfolio.
As of now, HP has not publicly commented on the claims made by the ransomware group, and there has been no official confirmation of a breach. It is important to note that the allegations originate solely from the threat actor and have not been independently verified.
Overview of the Everest Ransomware Group
The Everest ransomware group has emerged as one of the most active ransomware organizations, particularly notable in 2025 and continuing into 2026. The group has claimed attacks on numerous high-profile organizations, including McDonald’s India, Nissan, ASUS, Chrysler, Iberia Airlines, Under Armour, Petrobras, and AT&T, among others.
On February 2, 2026, Hackread contacted HP Inc. through official support channels for clarification on the situation. HP support acknowledged the inquiry and stated they would check with the relevant team for an update. No response had been received at the time of publication.
The implications of this breach, if substantiated, could be significant for HP and its customers, particularly in terms of security and trust. As the situation develops, stakeholders across various sectors will be watching closely to see how HP responds to these allegations and whether measures will be implemented to address potential vulnerabilities.
