play ransomware targets infrastructure

Federal authorities have confirmed that the Play ransomware group has successfully infiltrated approximately 900 organizations worldwide since the cybercriminal operation began in June 2022, marking a dramatic escalation in the threat’s scope and impact.

The cybercriminal enterprise, also referred to as PlayCrypt, has emerged as one of the most active ransomware gangs in 2024, targeting critical infrastructure providers across North America, South America, and Europe.

The PlayCrypt ransomware operation has become a dominant cyber threat targeting critical infrastructure across three continents in 2024.

The Cybersecurity and Infrastructure Security Agency, Federal Bureau of Investigation, and Australian Cyber Security Centre issued updated guidance on June 4, 2025, revising their original December 2023 warning that reported approximately 300 victims by October 2023. This represents a tripling of confirmed breaches within seven months, demonstrating the group’s accelerating operational tempo.

Play ransomware actors employ a sophisticated double extortion model, encrypting organizational systems after exfiltrating sensitive data. Unlike traditional ransomware operations, Play’s ransom notes deliberately omit initial payment demands or specific instructions, instead directing victims to contact threat actors through unique @gmx.de or @web.de email addresses for individual negotiations.

Some victims receive telephone calls with explicit threats to release stolen information.

Since mid-January, Play operatives and affiliated initial access brokers have aggressively targeted vulnerabilities in the SimpleHelp remote support tool. The attackers exploit three specific security flaws: CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726.

CVE-2024-57727 represents a particularly dangerous path traversal vulnerability, enabling unauthenticated attackers to download arbitrary files from compromised systems. These vulnerabilities can be chained together, allowing cybercriminals to raise privileges to administrator level and execute malicious code remotely.

The group first appeared in Australia during April 2023, with continued targeting of Australian organizations through November 2023. Play ransomware has previously been linked to attacks against ConnectWise ScreenConnect and Rackspace, demonstrating their capacity to breach established technology providers.

Play operates as a presumed closed group designed to “guarantee the secrecy of deals,” suggesting a selective membership model that prioritizes operational security.

Federal authorities highlight that organizations must regularly patch software applications, maintain updated systems, and implement thorough cybersecurity protocols to mitigate the evolving threat posed by this prolific ransomware operation.

You May Also Like

Ransomware Gangs Hijack SharePoint Servers Even After Patching, Microsoft Confirms Alarming Tactic

Even after patching, ransomware gangs found a way to hijack SharePoint servers worldwide. Microsoft confirms over 400 organizations fell victim to this devious tactic.

Play Ransomware Wreaks Havoc: 600 Organizations Hit Since 2023, Says FBI

FBI reveals staggering Play ransomware assault on 600+ organizations, with hackers demanding millions through a twisted double-extortion scheme. Your company might be next.

Ruthless BERT Ransomware Cripples Asia and Europe With Multiplatform Strikes

A devastating ransomware group is crippling enterprises worldwide with unprecedented tactics, while cybersecurity experts scramble to understand its innovations.

Ransomware Explodes 46% as Industrial OT Systems Become Prime Cybercrime Targets in 2025

Industrial systems are now cybercriminals’ favorite prey, with ransomware attacks skyrocketing 46% and wreaking $57 billion in damages. Your operations could be next.