> Back to All Posts

England Hockey Hit by AiLock Ransomware Attack

AiLock ransomware

England Hockey is investigating a potential data breach after the AiLock ransomware gang listed the organization as a victim on its public leak site. The group claims to have stolen 129GB of data from the national governing body’s systems. And is now threatening to publish it unless a ransom is paid. AiLock ransomware is a relatively new but technically capable threat, and this incident puts the personal data of players, staff, and members at serious risk.

What Happened at England Hockey

England Hockey oversees field hockey across England, covering more than 800 clubs and roughly 150,000 players. On March 12, 2026, reports emerged that the AiLock gang had added the organization to its data leak site, a public page where ransomware groups list victims who have not yet paid. The organization confirmed it is aware of the claim and has launched an investigation.

“We are aware of an incident involving England Hockey and are currently investigating the matter as a priority,” a spokesperson said. A follow-up statement added: “We are working with external specialists to help understand what this means.”

England Hockey has not confirmed whether data was actually taken from its systems. The investigation involves both internal teams and outside cybersecurity experts. Law enforcement has also been brought in. The organization said it cannot comment on specific data at this stage, but added:

“We take data security matters extremely seriously, and understanding what, if any, data may have been impacted in this incident is a top priority.”

Who Is AiLock Ransomware?

AiLock ransomware first appeared in March 2025, when Zscaler researchers identified the group’s ransom note and confirmed it was operating a negotiation site. Security firm S2W Talon later obtained ransomware samples and conducted a detailed technical analysis.

The group runs a ransomware-as-a-service (RaaS) model. That means the core developers rent out their tools to affiliates, who then carry out attacks and split any ransoms collected. AiLock operates both a private negotiation site and a public data leak site, using the threat of exposure to pressure victims into paying.

What makes AiLock ransomware technically notable is its encryption approach. Researcher Huiseong Yang of S2W Talon found that the malware uses ChaCha20 to encrypt file content, paired with NTRUEncrypt to protect the encryption keys. NTRUEncrypt is a post-quantum algorithm, meaning it is designed to resist future decryption attempts using advanced computing methods. Files receive a .AILock extension once locked, and a ransom note called Readme.txt is dropped into every affected directory.

The malware targets both local drives and network shares. It also stops services, kills active processes, clears the Recycle Bin, and modifies desktop wallpaper and file icons. Some versions include a self-deletion function to cover the group’s tracks once encryption is complete.

How AiLock Pressures Victims

AiLock ransomware uses a double-extortion model. The group first steals data, then encrypts files. This gives them two points of leverage: victims face both the loss of access to their systems and the threat of sensitive information going public.

The pressure tactics are aggressive and time-bound. Victims get 72 hours to make first contact and begin negotiating. From there, they have five days to pay. If neither deadline is met, AiLock threatens to publish the stolen data and destroy any tools that would help with recovery.

The group adds a third layer of pressure through regulatory threats. Its ransom notes warn that if payment is refused, the relevant data protection authorities in the victim’s country will be notified about the breach. Competitors may also be contacted. This tactic is designed to turn the cost calculation against victims, making non-payment feel riskier than paying up.

What Data Could Be at Risk

England Hockey holds a significant volume of personal data across its membership base. Players, coaches, staff, volunteers, and administrative contacts all interact with the organization’s systems. Depending on what was accessed, the 129GB claim could include:

  • names
  • email addresses
  • phone numbers
  • dates of birth
  • financial records
  • and potentially medical information

Sports governing bodies often collect such data for athlete welfare purposes. International players may also have passport details on file.

None of this has been confirmed. England Hockey has not verified what data, if any, was exfiltrated. But the volume of the alleged theft means the scope could be broad.

What Players and Members Should Do Now

While the investigation continues, people connected to England Hockey should take some basic precautions. Watch for unexpected emails, especially any that reference England Hockey, ask for personal details, or include suspicious links. Phishing campaigns often follow reported breaches, targeting people whose contact details may have been exposed.

It is also worth reviewing any accounts that use the same password as one linked to England Hockey-related services. If the same credentials appear anywhere else, change them now. Enable two-factor authentication where it is available.

Anyone who receives suspicious contact claiming to be from England Hockey should report it directly to the organization and avoid clicking any links in the message.

Final Thoughts

The AiLock ransomware attack on England Hockey is a clear example of how ransomware groups are expanding their target pool beyond large corporations. Sports governing bodies, nonprofits, and membership organizations hold large volumes of personal data, but often lack the security resources to match. AiLock ransomware operates with a level of technical and tactical sophistication that most organizations are not prepared for, from post-quantum encryption to regulatory pressure plays. England Hockey has said the investigation is a priority. Until more is confirmed, members should stay alert and take sensible steps to protect their personal information.

Janet Andersen

Janet is an experienced content creator with a strong focus on cybersecurity and online privacy. With extensive experience in the field, she’s passionate about crafting in-depth reviews and guides that help readers make informed decisions about digital security tools. When she’s not managing the site, she loves staying on top of the latest trends in the digital world.