home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 1440 
 Mike Powell to All 
 FBI warns Play ransomware 
 06 Jun 25 09:01:00 
 
TZUTC: -0500
MSGID: 1173.consprcy@1:2320/105 2ca83105
PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0
TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0
BBSID: CAPCITY2
CHRS: ASCII 1
FBI warns Play ransomware hackers have hit nearly a thousand US firms

Date:
Thu, 05 Jun 2025 14:28:00 +0000

Description:
Play hackers have added phone calls to their extortion tactics, and are
targeting more flaws.

FULL STORY

Play Ransomwares body count is almost hitting four digits, a new warning from
top legal enforcement has revealed, urging businesses to stay on guard 
against attacks. 

In an updated security advisory, published by the FBI, CISA, and the
Australian Signals Directorates Australian Cyber Security Centre (ASDs ACSC),
it was said that Play and its affiliates exploited approximately 900 
entities. 

Play Ransomware, also known as Playcrypt, is an infamous ransomware operator.
It is known for using the atypical triple-extortion method in which, besides
encrypting and exfiltrating files, it also calls its victims on the phone to
convince them to pay up.

SimpleHelp flaws targeted 

The security agencies security advisory has been updated to reflect changes
Play and its affiliates made in recent times. For example, it was said that
the victims get a unique @gmx.de, or @web.de email address, through which
theyre invited to communicate with the attackers. 

Furthermore, the group seems to have added new vulnerabilities to the ones
they were already targeting. Besides FortiOS (CVE-2018-13379, and
CVE-2020-12812) and Microsoft Exchange (ProxyNotShell CVE-2022-41040 and
CVE-2022-41082) bugs, they are now exploiting CVE-2024-57727 in remote
monitoring and management (RMM) tool SimpleHelp, which theyre using for 
remote code execution (RCE) capabilities. 

This vulnerability was first spotted in mid-January 2025, and has been
exploited since. 

To make things even worse, the agencies are saying that the Play ransomware
binary is recompiled for every attack, which means it gets a new, unique 
hash, for each deployment. This complicates anti-malware and antivirus 
program detection. 

Play was first spotted around 2020, and in the past, was known for targeting
Windows-powered devices, but in late July 2024, security researchers saw a
Linux variant targeting VMWare ESXi environments. 

In a technical breakdown, Trend Micros Threat Hunting team said at the time
that it was the first time Play was seen targeting ESXi environments, and it
could be that the criminals are broadening their attacks across the Linux
platform. 

 Via The Register

======================================================================
Link to news story:
https://www.techradar.com/pro/security/fbi-warns-play-ransomware-hackers-have-
hit-nearly-a-thousand-us-firms

$$
--- SBBSecho 3.20-Linux
 * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)
SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700
SEEN-BY: 226/30 227/114 229/110 111 114 206 300 307 317 400 426 428
SEEN-BY: 229/470 664 700 705 266/512 291/111 320/219 322/757 342/200
SEEN-BY: 396/45 460/58 712/848 902/26 2320/0 105 3634/12 5075/35
PATH: 2320/105 229/426


<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca