Play Ransomware: The Shadow Syndicate

Play is a highly capable ransomware group demonstrating advanced technical skills and operational sophistication.
Play Ransomware: The Shadow Syndicate
Table of Contents
    Add a header to begin generating the table of contents

    Overview:

    • Sophisticated Threat Actor: Play is a highly capable ransomware group demonstrating advanced technical skills and operational sophistication.
    • Diverse Targets: Their victims range from small and medium-sized businesses (SMBs) to large organizations, including government agencies and major corporations across multiple countries.
    • Multi-Stage Attacks: Their attacks involve multiple stages, from initial access (often exploiting vulnerabilities or using exposed RDP) to lateral movement within the network, data exfiltration, and finally, encryption and ransom demands.
    • Double Extortion: Play employs double extortion, threatening to release stolen data publicly if the ransom is not paid, maximizing their leverage.
    • .play File Extension: Encrypted files are typically marked with the “.play” extension.
    • Potential Links to Other Groups: Evidence suggests possible connections to other ransomware groups (Hive, Nokoyawa, Quantum), based on shared infrastructure and tactics, although definitive proof is lacking.
    • Global Reach: Victims are located across various countries, including the United States, the United Kingdom, Switzerland, and Argentina, highlighting their international operational capabilities.
    • Unclear Motivations: The precise motivations behind Play’s attacks remain unclear.
    • Significant Data Breaches: Their attacks have resulted in substantial data breaches, compromising sensitive information such as personal data, financial records, and intellectual property.

    Known Aliases:

    Play, Playcrypt

    Country of Origin:

    Not known.

    High-Profile/Notable Attacks/Victims:

    • Argentine Judiciary of Córdoba (2022): A major attack was carried out on the Argentine judiciary in Córdoba. This attack involved the typical “.play” file extension encryption and a ransom note.
    • Judiciary of Cordoba (Late 2022): A cyberattack targeted the city of Cordoba’s Judiciary systems, encrypting files with the “.play” extension and leaving a ransom note.
    • Dallas County: Play launched an attack on Dallas County, stealing records of over 200,000 individuals. Stolen data included SSNs, state identification numbers, taxpayer information, medical information, and health insurance details.
    • Swiss Government (May 2023): Play breached over 1.3 million confidential records from private government servers, with 65,000 directly related to the federal administration.
    • Arnold Clark: This large European car retailer was targeted, resulting in the theft of customer ID information, banking details, and vehicle registration records. The company engaged in negotiations with Play.
    • CH-Media (2023): An attack on the Neue Zürcher Zeitung newspaper led to the compromise of its service provider, CH-Media, resulting in the exposure of addresses of over 400,000 Swiss citizens living abroad.
    • Valais Community (2023): A community in Valais, Switzerland, was also victimized in March 2023.
    • Federal Administration of Switzerland (May/June 2023): A massive attack on an IT service provider of the Swiss Federal Administration resulted in the theft of confidential data, including financial and tax information, affecting various state-owned companies.
    • Rackspace (2023): The Play ransomware group was confirmed to be behind a cyberattack on Rackspace.

    Common Methods of Infiltration:

    The Play ransomware group uses a multi-pronged approach to infiltration:

    • Exploitation of known vulnerabilities: They actively exploit vulnerabilities in software like FortiOS and Microsoft Exchange.
    • Credential theft: They steal valid user credentials to gain initial access.
    • Remote access exploitation: They utilize exposed Remote Desktop Protocol (RDP) and Virtual Private Network (VPN) services.
    • Malware/Ransomware Strains: The primary ransomware used is Play ransomware (also known as Playcrypt). They also utilize supporting malware, including the SystemBC malware and a custom data-gathering tool. It also uses tools like Grixba (an information stealer).

    MITRE ATT&CK Tactics and Techniques:

    The Play ransomware group utilizes a variety of MITRE ATT&CK tactics and techniques, including:

    • Initial Access:
      • T1078: Valid Accounts (abuse of compromised credentials)
      • T1190: Exploit Public-Facing Application (exploiting vulnerabilities in FortiOS (CVE-2018-13379 and CVE-2020-12812) and Microsoft Exchange (ProxyNotShell [CVE-2022-41040 and CVE-2022-41082]))
      • T1133: External Remote Services (RDP and VPN)
    • Discovery:
      • T1016: System Network Configuration Discovery (using tools like AdFind and Grixba)
      • T1518.001: Software Discovery: Security Software Discovery (scanning for anti-virus software)
    • Defense Evasion:
      • T1562.001: Impair Defenses: Disable or Modify Tools (disabling anti-virus software using GMER, IOBit, and PowerTool)
      • T1070.001: Indicator Removal: Clear Windows Event Logs (removing log files)
    • Credential Access:
      • T1552: Unsecured Credentials (searching for unsecured credentials)
      • T1003: OS Credential Dumping (using Mimikatz)
    • Lateral Movement:
      • T1570: Lateral Tool Transfer (distributing executables via Group Policy Objects)
    • Command and Control:
      • T1484.001: Domain Policy Modification: Group Policy Modification (using Cobalt Strike and SystemBC)
    • Collection:
      • T1560.001: Archive Collected Data: Archive via Utility (using WinRAR)
    • Exfiltration:
      • T1048: Exfiltration Over Alternative Protocol (using WinSCP)
    • Impact:
      • T1486: Data Encrypted for Impact (using AES-RSA hybrid encryption)
      • T1657: Data Encrypted for Impact (double extortion model)

    Related Posts