England Hockey officials have launched an investigation after they appear on a leaking site of the Ransomware group AiLock, which claims to have exfiltered Federation data. According to the group's publication, the attackers were reportedly made with around 129 GB of information and threaten to post the files unless a ransom is paid. The organization, which is responsible for the management and promotion of grass hockey throughout the country, recognizes the situation and is addressing the issue with the highest priority.
In its public response, England Hockey has reported that it is working with external experts and involving the competent authorities as it reports exactly what has happened. For the time being, it does not provide specific details on the nature of the data that might be affected, nor does it independently confirm the extent of the access identified by the group. The news was collected by means specialized in security such as BleepingComputer, which quotes the organization itself and the actor's list on its leaks portal.

The potential scope of the incident concerns both the volume of information and the portfolio of individuals and entities linked to England Hockey: the federation brings together more than 800 clubs, about 150,000 registered players and about 15,000 coaches, arbitrators and officers. This is why, if a data leak is confirmed, the impact can be extended from fans and base practitioners to elite-level templates and equipment.
AiLock is a relatively recent actor in the ansomware ecosystem, but it has already attracted the attention of researchers. In early April 2025, analysts from the Zscaler company described the group as an operator using sophisticated extortion tactics and taking advantage of privacy violations as a lever in the negotiations with the victims; their report is part of a broader analysis of emerging threats ( see analysis of Zscaler).
Technical details published by independent researchers also help to understand the modus operandi: according to an analysis published in Medium by a S2W Talon researcher, the AiLock cipher uses algorithms such as ChaCha20 and NTRUEncrypt to block files, adds the .AILock extension to encrypted files and leaves rescue notes in the affected folders. This combination places this family of ransomware within modern variants that seek to make recovery difficult without decryption keys ( technical analysis in Spain).
In addition to encryption, AiLock and related groups practice the so-called "double extortion": they first exfilter data and then demand a payment for not publishing the committed information. In many cases, attackers set short deadlines to start negotiations and threats of public filtration if an agreement is not reached - a tactic designed to press and force rapid decisions. This strategy exacerbates the reputational and legal risk to the organizations attacked.
For people linked to England Hockey - players, coaches, officers and club members - the immediate recommendation is to increase prudence against unexpected communications. It is common that, following such incidents, criminals attempt to take advantage of stolen data in phishing campaigns or fraud attempts. Change passwords, activate the authentication of two factors where it is available and distrust emails or messages that ask for credentials or payments are sensible measures at this time.
Organizations should also follow established protocols for cyber incidents: contain intrusion, preserve evidence for researchers, notify the competent authorities and assess whether there is a legal obligation to inform data protection regulators. In the United Kingdom, the Office of the Information Commissioner (ICO) provides guidelines on reporting of gaps and obligations of entities dealing with personal data ( ICO guide). The National Cyber Security Centre (NCSC) also provides practical recommendations to mitigate and respond to Ransomware incidents and phishing campaigns ( NCSC instructions).
It is important to remember that paying a rescue does not guarantee full recovery or the removal of the threat: in addition to financing the attackers, payment does not always result in the safe return of the data or prevents subsequent publication. This is why the response teams provide for both technical recovery options and legal and communication evaluation, to protect the affected and reduce reputational damage.

In the future, incidents such as this stress the need for continued security investments by sports federations and civil society organizations, which store sensitive personal information but often have limited resources for technological protection. The implementation of minimum access policies, robust and verified backup, phishing training for staff and members, and regular security assessments can make the difference between a scare and a prolonged crisis.
As the investigation progresses, England Hockey has requested time to work with external specialists and authorities, and promises to keep the community informed as more verifiable information becomes available. For those looking for guidance on how to protect themselves or how to respond to possible attempts at supplanting, the NCSC maintains resources on how to identify fraudulent emails and act safely ( NCSC phishing tips).
This episode is a reminder that cybersecurity is not just a business issue: sports and community organizations are also objective. Transparency, collaboration with experts and practical protection measures will be key to limiting damage and restoring the confidence of players and clubs.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...