Hackers take a swing at the Ryder Cup
Criminals hijacked PGA servers, locking officials out of crucial tournament files
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Hackers have targeted the governing body of international golf tournaments, the PGA, by locking officials out of crucial files.
The staff of the Professional Golfers' Association (PGA) realised on Tuesday morning that the systems had been compromised when attempts to access files for the upcoming tournaments generated an ominous message.
"Your network has been penetrated," the message stated. "All files on each host in the network have been encrypted with a strong algorithm. This may lead to the impossibility of recovery of certain files."
The files are allegedly related to this week's PGA Championships at Bellerive Country Club and next month's Ryder Cup in France and contain creative materials, such as extensive promotional banners and logos used in digital and print communications. There are even unseen designs for logos for future PGA events.
The hackers encrypted the files for ransom, offering a Bitcoin wallet number, but no ransom amount has been specified.
According to Golfweek, a spokesperson for the PGA said it would not comment on the situation as it is still ongoing and that the organisation had not yet resolved the issue.
Barry Shteiman, VP of research and innovation at Exabeam, highlighted the conundrum facing organisations that fall victim to ransomware.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"To pay or not to pay, that is the seemingly million-dollar question when it comes to ransomware," Shteiman said. "While many security experts warn about paying ransoms or entering into negotiations, the answer, in reality, comes down to simple economics.
"If the downtime caused by data being unavailable, or by the backup restoration process is more expensive than paying the ransom, then organisations should pay. Equally, if giving up on the encrypted data has a higher cost in lost revenue or intellectual property than remediation, then you can also see why an organisation would pay the ransom."
Over the last couple of years, a number of sporting events have been targeted by hackers, such as the Winter Olympic in North Korea, last season's Champions League Final in Kiev and this summer's World Cup, where Android users were tricked with malicious apps called 'Golden Cups'.
A study of ransomware victims released in March found that of those that paid up only 49% had their data handed back to them. Interestingly, of those that refused to pay, a staggering 89% said they eventually recovered their data.
Bobby Hellard is ITPro's Reviews Editor and has worked on CloudPro and ChannelPro since 2018. In his time at ITPro, Bobby has covered stories for all the major technology companies, such as Apple, Microsoft, Amazon and Facebook, and regularly attends industry-leading events such as AWS Re:Invent and Google Cloud Next.
Bobby mainly covers hardware reviews, but you will also recognize him as the face of many of our video reviews of laptops and smartphones.
-
Anthropic reveals Claude Opus 4.6, its new enterprise-focused modelNews The AI developer highlighted financial and legal tasks, as well as agent tool use, as particular strengths for the new model
-
AI-generated code is fast becoming the biggest enterprise security riskNews Security teams are scrambling to catch AI-generated flaws that appear correct before disaster strikes
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
-
Cybersecurity experts face 20 years in prison following ransomware campaignTwo men used their tech expertise to carry out ALPHV BlackCat ransomware attacks
-
15-year-old revealed as key player in Scattered LAPSUS$ HuntersNews 'Rey' says he's trying to leave Scattered LAPSUS$ Hunters and is prepared to cooperate with law enforcement
