CISA releases TTPs & IoCs for Play Ransomware That Hacked 900+ Orgs | #ransomware | #cybercrime


The Cybersecurity and Infrastructure Security Agency (CISA), alongside the Federal Bureau of Investigation (FBI) and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), has released detailed Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IoCs) for the notorious Play ransomware group.

As of May 2025, the FBI has identified approximately 900 entities allegedly exploited by these threat actors, underscoring the significant scale and impact of this ransomware variant across North America, South America, and Europe since its emergence in June 2022.

Known also as Playcrypt, this ransomware group has been among the most active in 2024, targeting a broad spectrum of businesses and critical infrastructure with a sophisticated double extortion model.

– Advertisement –

The advisory, updated on June 4, 2025, details how Play ransomware actors gain initial access by exploiting vulnerabilities in public-facing applications, such as FortiOS (CVE-2018-13379, CVE-2020-12812) and Microsoft Exchange (ProxyNotShell vulnerabilities CVE-2022-41040 and CVE-2022-41082), alongside abusing valid accounts likely procured from dark web markets.

They leverage external-facing services like Remote Desktop Protocol (RDP) and Virtual Private Networks (VPN) for entry, with recent reports highlighting exploitation of SimpleHelp remote monitoring and management tool vulnerabilities (CVE-2024-57727) for remote code execution.

Over 900 Entities Affected by Sophisticated Double Extortion Model

Once inside, the group employs tools like AdFind for Active Directory queries and Grixba, an information-stealer, for network enumeration, while disabling antivirus software using tools such as GMER and IOBit.

Their lateral movement is facilitated by command and control applications like Cobalt Strike and SystemBC, with Mimikatz used for credential dumping to gain domain administrator access.

A unique aspect of their operation is recompiling the ransomware binary for each attack, resulting in distinct hashes that evade traditional anti-malware detection, complicating defense efforts.

Play ransomware’s impact is amplified by its double extortion strategy, encrypting systems post-data exfiltration and demanding cryptocurrency ransoms via unique @gmx.de or @web.de email addresses provided to victims.

Non-compliant organizations face threats of data leaks on the group’s Tor network site, often accompanied by direct phone calls to pressure payment.

The group’s ESXi variant specifically targets virtual environments, encrypting files with extensions like .vmdk and .vmx using AES-256 encryption while shutting down virtual machines.

The advisory emphasizes urgent mitigation steps, including multifactor authentication, regular software patching, network segmentation, and maintaining offline encrypted backups to curb the ransomware’s spread and impact.

Organizations are also encouraged to validate security controls against the MITRE ATT&CK framework techniques outlined in the report to strengthen defenses against this evolving threat.

This comprehensive update serves as a vital resource for network defenders aiming to fortify their systems against Play ransomware’s persistent and evolving threat landscape.

Indicators of Compromise (IoCs)

Hash (SHA-256) Description
47B7B2DD88959CD7224A5542AE8D5BCE928BFC986BF0D0321532A7515C244A1E SVCHost.dll (Backdoor)
75B525B220169F07AECFB3B1991702FBD9A1E170CAF0040D1FCB07C3E819F54A Backdoor
1409E010675BF4A40DB0A845B60DB3AAE5B302834E80ADEEC884AEBC55ECCBF7 PSexesvc.exe (Custom Play “psexesvc”)
0E408AED1ACF902A9F97ABF71CF0DD354024109C5D52A79054C421BE35D93549 HRsword.exe (Disables endpoint protection)
6DE8DD5757F9A3AC5E2AC28E8A77682D7A29BE25C106F785A061DCF582A20DC6 Hi.exe (Associated with ransomware)

To Upgrade Your Cybersecurity Skills, Take Diamond Membership With 150+ Practical Cybersecurity Courses Online – Enroll Here



Source link

.........................

National Cyber Security

FREE
VIEW