The ransomware known as Play has undergone a significant transformation, transitioning into a commercially offered service for cybercriminals, as detailed by cybersecurity firm Adlumin. This shift, termed “Ransomware-as-a-Service” (RaaS), signifies a new and alarming development in the cyber threat landscape.
Evidence suggests that Play is now available for purchase by threat actors, who follow comprehensive playbooks, resulting in nearly identical attacks across various sectors. The lack of variation in attack tactics, including the use of specific folders and passwords, supports the notion that affiliates are executing attacks based on step-by-step instructions provided with the RaaS package.
Originally identified in June 2022, Play, also known as Balloonfly and PlayCrypt, initially exploited vulnerabilities in Microsoft Exchange Server to infiltrate networks. The ransomware’s operators, unique in their simultaneous role as developers and executors of attacks, set Play apart from other ransomware groups.
This recent evolution into a RaaS model not only marks a departure from previous modes of operation but also enhances Play’s appeal to cybercriminals by offering a comprehensive package, including documentation, forums, technical support, and ransom negotiation support.
As Play ransomware embraces this new RaaS approach, the cybersecurity community warns of a potential surge in incidents, as the model becomes more accessible, attracting a broader range of threat actors, including less experienced “script kiddies.”
The implications of this shift underscore the need for heightened vigilance and preparedness among businesses and authorities to counter the growing wave of cyber threats facilitated by Play and similar RaaS operations.