Hackers take a swing at the Ryder Cup
Criminals hijacked PGA servers, locking officials out of crucial tournament files
Hackers have targeted the governing body of international golf tournaments, the PGA, by locking officials out of crucial files.
The staff of the Professional Golfers' Association (PGA) realised on Tuesday morning that the systems had been compromised when attempts to access files for the upcoming tournaments generated an ominous message.
"Your network has been penetrated," the message stated. "All files on each host in the network have been encrypted with a strong algorithm. This may lead to the impossibility of recovery of certain files."
The files are allegedly related to this week's PGA Championships at Bellerive Country Club and next month's Ryder Cup in France and contain creative materials, such as extensive promotional banners and logos used in digital and print communications. There are even unseen designs for logos for future PGA events.
The hackers encrypted the files for ransom, offering a Bitcoin wallet number, but no ransom amount has been specified.
According to Golfweek, a spokesperson for the PGA said it would not comment on the situation as it is still ongoing and that the organisation had not yet resolved the issue.
Barry Shteiman, VP of research and innovation at Exabeam, highlighted the conundrum facing organisations that fall victim to ransomware.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"To pay or not to pay, that is the seemingly million-dollar question when it comes to ransomware," Shteiman said. "While many security experts warn about paying ransoms or entering into negotiations, the answer, in reality, comes down to simple economics.
"If the downtime caused by data being unavailable, or by the backup restoration process is more expensive than paying the ransom, then organisations should pay. Equally, if giving up on the encrypted data has a higher cost in lost revenue or intellectual property than remediation, then you can also see why an organisation would pay the ransom."
Over the last couple of years, a number of sporting events have been targeted by hackers, such as the Winter Olympic in North Korea, last season's Champions League Final in Kiev and this summer's World Cup, where Android users were tricked with malicious apps called 'Golden Cups'.
A study of ransomware victims released in March found that of those that paid up only 49% had their data handed back to them. Interestingly, of those that refused to pay, a staggering 89% said they eventually recovered their data.
Bobby Hellard is ITPro's Reviews Editor and has worked on CloudPro and ChannelPro since 2018. In his time at ITPro, Bobby has covered stories for all the major technology companies, such as Apple, Microsoft, Amazon and Facebook, and regularly attends industry-leading events such as AWS Re:Invent and Google Cloud Next.
Bobby mainly covers hardware reviews, but you will also recognize him as the face of many of our video reviews of laptops and smartphones.
-
Threat actors ditch ‘spray and pray’ attacks in shift to targeted exploitationNews A dip in ransomware volumes points to a more targeted approach focused on vulnerability exploitation
-
Security leaders overconfident about ransomware recoveryNews Few manage to recover all their data, and many experience business disruption
-
German authorities want your help finding the hackers behind GandCrab and REvilNews Daniil Maksimovich Shchukin and Anatoly Sergeevitsch Kravchuk are believed to have made millions from ransomware as a service schemes
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals


