The Everest ransomware group has announced a data breach affecting Polycom, a legacy brand in enterprise communications that was acquired by HP Inc. in 2022 and is now rebranded as Poly (HP Poly).
The group claims to have extracted around 90GB of internal data. However, initial investigations suggest that the information may derive from Polycom’s legacy engineering or development environments, existing prior to HP Inc.’s acquisition of the company.
In statements released on Everest’s dark web leak site, the group describes the compromised data as a combination of a database and internal documentation. They assert that the files are linked to Polycom’s systems and have threatened to disclose the information within a nine-day timeframe unless their demands are met.
To bolster their claims, Everest has disseminated a series of screenshots purportedly showcasing access to internal systems. The images appear to depict internal file directories, engineering build environments, source code repositories, software logs, and technical documents related to Polycom’s conferencing solutions, such as the RMX and RealPresence systems. Notably absent from these screenshots is any personal data or sensitive user information.
About Polycom
Polycom has undergone several significant corporate changes in recent years. The company was acquired by Plantronics in 2018, rebranded as Poly in 2019, and later acquired by HP Inc. in 2022.
Since these transitions, Poly’s products and services have been integrated under the HP brand, with legacy Polycom domains redirecting to HP-managed platforms.
At the time of reporting, HP Inc. has not publicly addressed the claims made by the ransomware group, and no confirmation of a breach has been released. As is common in ransomware incidents, the assertions originate solely from the threat actor and remain unverified by independent sources.
About Everest Ransomware
Everest ransomware emerged as one of the most active groups in 2025, continuing its operations into 2026. The group has claimed responsibility for attacks against various prominent organizations, including McDonald’s India, Nissan, and AT&T, among others.
On February 2, 2026, Hackread reached out to HP Inc. through its official support channels. HP support acknowledged the inquiry and indicated they would confer with the appropriate team for an update. As of this writing, no further response has been provided.