Hackers Threaten to Leak 47GB of Data from Leading Golf Apparel Company

INC Ransom claims to have stolen 47GB of data from Summit Golf Brands, threatening a public leak as part of its escalating multi-extortion ransomware campaign.
Hackers Threaten to Leak 47GB of Data from Leading Golf Apparel Company
Table of Contents
    Add a header to begin generating the table of contents

    A Russian-linked ransomware group has claimed responsibility for stealing 47GB of internal data from Summit Golf Brands, a prominent golf apparel manufacturer, and has set a countdown for its public release.

    Countdown Begins After Breach Claim Targeting Summit Golf Brands’ Internal Network

    The ransomware group known as INC Ransom announced on its dark web leak site that it had infiltrated Summit Golf Brands’ network and stolen roughly 47GB of corporate data. The post, published on October 16, 2025, named the U.S.-based company and displayed a timer threatening to release the data within three days if demands were not met.

    Summit Golf Brands owns several high-end sportswear lines, including Zero Restriction, B. Draddy, Fairway & Greene, and EP New York. The company generates nearly $28 million in annual revenue and maintains a strong presence in the U.S. and select international markets.

    According to early analysis, INC Ransom provided no evidence or data samples to substantiate its breach claims. Researchers believe the post may serve as psychological pressure, a tactic commonly used by ransomware groups to coerce victims into communication before delivering proof.

    “These timed leak announcements are a standard intimidation technique,” said a cybersecurity analyst monitoring the situation. “They often precede ransom negotiations and are designed to create maximum reputational stress on the target.”

    Investigators Question Authenticity of Stolen Data Ahead of Threatened Disclosure

    The research team analyzing INC Ransom’s claim noted inconsistencies suggesting the group may not yet possess the data it alleges to have stolen. The absence of file samples, metadata, or screenshots—normally used to validate such claims—points to a possible bluff or a preliminary listing meant to pressure the company.

    Despite the uncertainty, experts caution that even unverified claims can harm an organization’s brand reputation and disrupt operations. As ransomware groups increasingly weaponize publicity, many corporations face the dilemma of addressing media coverage before knowing the full scope of compromise.

    At the time of publication, Summit Golf Brands had not released any official statement or confirmed the breach. Cybersecurity specialists say the company’s silence could be strategic, as public acknowledgment might escalate extortion demands or draw attention to internal vulnerabilities.

    INC Ransom’s Rapid Rise Among High-Impact Global Threat Actors

    Since emerging in July 2023, INC Ransom has become one of the fastest-growing ransomware operations, claiming more than 230 victims globally across multiple sectors, from healthcare and education to defense and government institutions. The group is believed to have ties to Russian-speaking cybercriminal networks.

    INC Ransom uses a multi-extortion model that combines file encryption with data theft. Victims are told to pay to recover access and prevent leaks, often under the guise of a bizarre promise to “help strengthen their cybersecurity” after payment.

    “INC Ransom markets itself as a service provider in a twisted sense—offering ‘security advice’ after extortion,” said a threat intelligence expert. “It’s psychological manipulation designed to normalize the crime.”

    Notable victims have included the U.S. Department of Defense contractor Stark AeroSpace, the City of Leicester in England, the San Francisco Ballet, and Scotland’s NHS Dumfries and Galloway Health Board. The gang has also listed large corporations such as Xerox and Ahold Delhaize—the $99 billion retail giant behind Stop & Shop and Albert Heijn supermarkets—among its claimed breaches.

    More recently, INC Ransom has expanded its reach to smaller organizations and nonprofits, including Mount Rogers Community Services in the U.S. and even The Catholic Cemeteries of the Diocese of Hamilton in Canada. Earlier this year, it claimed responsibility for compromising 260GB of data from Thomasville, North Carolina, and for breaching the national broadcaster CNN Indonesia.

    Expanding Target Spectrum Raises Concerns Over Nontraditional Victims

    The targeting of Summit Golf Brands, a fashion and lifestyle company rather than a traditional high-value infrastructure entity, underscores an evolution in ransomware targeting strategy. Attackers are now focusing on consumer brands, apparel manufacturers, and retail organizations whose reputations are built on trust and branding rather than data sensitivity alone.

    “When criminals go after lifestyle brands, it’s not about stealing trade secrets—it’s about visibility,” noted a security consultant. “Public pressure becomes the weapon.”

    The attack highlights a broader risk to industries outside the usual scope of cyber defense investments. Companies in retail, apparel, and hospitality often lack the layered defense and incident response maturity found in critical sectors. Experts suggest immediate steps such as tightening vendor access, improving third-party risk management, and ensuring segmented data storage to mitigate future breaches.

    As the countdown to the supposed release continues, Summit Golf Brands faces mounting uncertainty. Whether INC Ransom’s claims are substantiated or not, the incident reinforces a clear message: no industry is too niche, or too refined, to be targeted in the modern ransomware economy.

    Related Posts