play ransomware targets infrastructure

Federal authorities have confirmed that the Play ransomware group has successfully infiltrated approximately 900 organizations worldwide since the cybercriminal operation began in June 2022, marking a dramatic escalation in the threat’s scope and impact.

The cybercriminal enterprise, also referred to as PlayCrypt, has emerged as one of the most active ransomware gangs in 2024, targeting critical infrastructure providers across North America, South America, and Europe.

The PlayCrypt ransomware operation has become a dominant cyber threat targeting critical infrastructure across three continents in 2024.

The Cybersecurity and Infrastructure Security Agency, Federal Bureau of Investigation, and Australian Cyber Security Centre issued updated guidance on June 4, 2025, revising their original December 2023 warning that reported approximately 300 victims by October 2023. This represents a tripling of confirmed breaches within seven months, demonstrating the group’s accelerating operational tempo.

Play ransomware actors employ a sophisticated double extortion model, encrypting organizational systems after exfiltrating sensitive data. Unlike traditional ransomware operations, Play’s ransom notes deliberately omit initial payment demands or specific instructions, instead directing victims to contact threat actors through unique @gmx.de or @web.de email addresses for individual negotiations.

Some victims receive telephone calls with explicit threats to release stolen information.

Since mid-January, Play operatives and affiliated initial access brokers have aggressively targeted vulnerabilities in the SimpleHelp remote support tool. The attackers exploit three specific security flaws: CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726.

CVE-2024-57727 represents a particularly dangerous path traversal vulnerability, enabling unauthenticated attackers to download arbitrary files from compromised systems. These vulnerabilities can be chained together, allowing cybercriminals to raise privileges to administrator level and execute malicious code remotely.

The group first appeared in Australia during April 2023, with continued targeting of Australian organizations through November 2023. Play ransomware has previously been linked to attacks against ConnectWise ScreenConnect and Rackspace, demonstrating their capacity to breach established technology providers.

Play operates as a presumed closed group designed to “guarantee the secrecy of deals,” suggesting a selective membership model that prioritizes operational security.

Federal authorities highlight that organizations must regularly patch software applications, maintain updated systems, and implement thorough cybersecurity protocols to mitigate the evolving threat posed by this prolific ransomware operation.

You May Also Like

Cyber Gangs Target Coca-Cola and Bottling Giant in Disturbing Ransomware and Data Theft Dispute

Two ruthless cyber gangs hold Coca-Cola’s secrets hostage after stealing sensitive data from 959 employees. The beverage giant faces its darkest digital nightmare yet.

How BERT Ransomware Knocks Out VMware ESXi Hosts to Cripple Recovery Before Demanding Ransom

This new ransomware unleashes chaos by killing virtual machines and destroying backups before demanding payment. Your ESXi infrastructure could be next.

Elite Law Firms Under Siege: FBI Exposes Ruthless Silent Ransom Group Campaign

Elite law firms face devastating attacks as Silent Ransom Group wreaks havoc, causing $4.88M in damages and exposing confidential client data across the industry.

How One Ransomware Gang Crippled Ingram Micro on Independence Day—and Why It Matters

A massive ransomware attack paralyzed tech giant Ingram Micro on July 4th, exposing a terrifying truth about holiday cybersecurity nobody saw coming.