England Hockey is investigating a potential data breach after the AiLock ransomware gang listed it as a victim, claiming to have stolen 129GB of data. The organization is working with external specialists and authorities to determine what happened. AiLock is a relatively new ransomware operation that uses double-extortion tactics and encrypts files with ChaCha20 and NTRUEncrypt.
| IOC Type | Value | Description | Relevant MITRE ATT&CK Techniques |
|---|---|---|---|
| Fileextension |
.AILock
|
File extension appended by the AiLock ransomware to encrypted files | T1486 |
| Malwarename | AiLock | Ransomware gang targeting England Hockey | T1486 |
| Code | Title |
|---|---|
| T1486 | Data Encrypted for Impact - The ransomware encrypts files, appending the .AILock extension. |
| T1566 | Phishing - The article mentions players should be vigilant for phishing attempts. |
| T1485 | Data Destruction - The ransomware threatens to destroy recovery tools. |
| T1564.001 | Hide Artifacts: File Attribute Modification - Ransomware often modifies file attributes. |
| T1564.002 | Hide Artifacts: Hidden Files - Ransomware often hides encrypted files. |
| T1003 | OS Credential Dumping - Common in ransomware attacks. |
| T1059 | Command and Scripting Interpreter - Often used in ransomware attacks. |
| T1090 | Proxy - Common in C2 communications. |
| T1134 | Access Token Manipulation - Common in ransomware attacks. |
| T1020 | Automated Exfiltration - The threat actor plans to automate data exfiltration. |
| Type | Value |
|---|---|
| Sector | sports/government |
England Hockey, the governing body for field hockey in England, is investigating a potential data breach after the
It was documented on April 1st, 2025, by researchers at cybersecurity company Zscaler, who noted that the threat actor was "leveraging sophisticated extortion tactics targeting enterprise networks." The hackers reportedly use privacy law violations as leverage in negotiations. They give victims 72 hours to respond and start negotiating, and wait five days for the payment under the threat of leaking stolen data and destroying recovery tools. According to past analysis from S2W Talon’s researcher Huiseong Yang , the ransomware uses ChaCha20 and NTRUEncrypt to lock files, appending the