play ransomware targets infrastructure

Federal authorities have confirmed that the Play ransomware group has successfully infiltrated approximately 900 organizations worldwide since the cybercriminal operation began in June 2022, marking a dramatic escalation in the threat’s scope and impact.

The cybercriminal enterprise, also referred to as PlayCrypt, has emerged as one of the most active ransomware gangs in 2024, targeting critical infrastructure providers across North America, South America, and Europe.

The PlayCrypt ransomware operation has become a dominant cyber threat targeting critical infrastructure across three continents in 2024.

The Cybersecurity and Infrastructure Security Agency, Federal Bureau of Investigation, and Australian Cyber Security Centre issued updated guidance on June 4, 2025, revising their original December 2023 warning that reported approximately 300 victims by October 2023. This represents a tripling of confirmed breaches within seven months, demonstrating the group’s accelerating operational tempo.

Play ransomware actors employ a sophisticated double extortion model, encrypting organizational systems after exfiltrating sensitive data. Unlike traditional ransomware operations, Play’s ransom notes deliberately omit initial payment demands or specific instructions, instead directing victims to contact threat actors through unique @gmx.de or @web.de email addresses for individual negotiations.

Some victims receive telephone calls with explicit threats to release stolen information.

Since mid-January, Play operatives and affiliated initial access brokers have aggressively targeted vulnerabilities in the SimpleHelp remote support tool. The attackers exploit three specific security flaws: CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726.

CVE-2024-57727 represents a particularly dangerous path traversal vulnerability, enabling unauthenticated attackers to download arbitrary files from compromised systems. These vulnerabilities can be chained together, allowing cybercriminals to raise privileges to administrator level and execute malicious code remotely.

The group first appeared in Australia during April 2023, with continued targeting of Australian organizations through November 2023. Play ransomware has previously been linked to attacks against ConnectWise ScreenConnect and Rackspace, demonstrating their capacity to breach established technology providers.

Play operates as a presumed closed group designed to “guarantee the secrecy of deals,” suggesting a selective membership model that prioritizes operational security.

Federal authorities highlight that organizations must regularly patch software applications, maintain updated systems, and implement thorough cybersecurity protocols to mitigate the evolving threat posed by this prolific ransomware operation.

You May Also Like

Ruthless BERT Ransomware Cripples Asia and Europe With Multiplatform Strikes

A devastating ransomware group is crippling enterprises worldwide with unprecedented tactics, while cybersecurity experts scramble to understand its innovations.

FBI Sounds Alarm on Raging Cyberattacks as Ransomware Cripples Critical Sectors

Cybercriminals are crippling America’s vital sectors while the FBI desperately races to stop the worst ransomware epidemic in history. Will your data survive?

Cyber Gangs Target Coca-Cola and Bottling Giant in Disturbing Ransomware and Data Theft Dispute

Two ruthless cyber gangs hold Coca-Cola’s secrets hostage after stealing sensitive data from 959 employees. The beverage giant faces its darkest digital nightmare yet.

Ransomware Gangs Hijack SharePoint Servers Even After Patching, Microsoft Confirms Alarming Tactic

Even after patching, ransomware gangs found a way to hijack SharePoint servers worldwide. Microsoft confirms over 400 organizations fell victim to this devious tactic.