Play ransomware, also known as Play or Playcrypt, is a group of cybercriminals that have successfully infiltrated over 300 organizations around the world. Their ransomware attacks use unique tactics like intermittent encryption and double extortion to exfiltrate company data and threaten businesses.
Since its first appearance in 2022, Play Ransomware Group has been responsible for several major breaches, including at:
Typically, Play installs ransomware on a company’s systems, encrypting their data and demanding a ransom payment or exfiltrating business data and selling it on the dark web forum. Some of their attacks have had international repercussions, impacting hundreds of thousands of customers at once.
The Play ransomware group has an online Tor blog where they publish details of each of their attacks, including summaries of the data they have managed to capture during each attack.
Play utilizes FortiOS vulnerabilities CVE-2020-12812 and CVE-2018-13379, along with exposed RDP servers, to breach organizations. Once they access a system, they will then distribute ransomware payloads across the system by using Group Policy Objects. By running these as scheduled tasks, they can systematically begin the encryption of files across a network, quickly taking over.
One of the defining characteristics of this ransomware gang is the use of intermittent encryption. In traditional ransomware, the payloads will encrypt the entirety of files, preventing network administrators from accessing them. However, rapid encryption of many files is a threat vector that many security systems will recognize and flag.
To overcome this defense, Play’s use of intermittent encryption will only encrypt selective parts of each file.
This approach allows them to fly under the radar and avoid the majority of endpoint security solutions while still encrypting core bytes in files that give the threat actor initial access while blocking out the company itself.
Play also leverages a company’s reputation to pressure them into compliance. According to the CSA, Play offers complete secrecy to any company that pays their ransomware fee, with those that do not pay instantly having all of their data published online and details of the exploit published to their Tor blog.
Play has launched international ransomware campaigns, many of which have disrupted high-ranking institutions, including large enterprises, governments, and even major city councils.
Here are some of the most notable attacks of the last few years:
The vast majority of stories related to Play gain heavy media attention and then rapidly disappear from the public eye. It seems that without clear defense systems in place and options to recover their data, corrupted organizations may have to enter into conversation with the Play ransomware group.
While Play has been less active in 2024 than in previous years, it still represents a major threat to unsecured organizations.
Here are some of the leading strategies to protect itself from ransomware attacks:
Play and other major ransomware groups are becoming far more common, with the sheer scope of modern enterprise attack surfaces making companies more vulnerable than ever. In the face of the rising cyber threat, enterprises need to turn to effective cybersecurity solutions to keep their businesses as secure as possible.
Check Point Anti-Ransomware software forms a core segment of the full endpoint security solution. With a comprehensive level of protection across every company endpoint, Check Point allows your business to automate cybersecurity and enhance defenses across the board.
With this solution, your business will be able to reduce the risk of a successful ransomware attack while protecting itself from numerous other leading cybersecurity threats. Reach out to Check Point to book a demo today.