Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

FBI Warns Play Ransomware Victims Triple

June 6, 2025
Reading Time: 3 mins read
in News
InfoJobs Spain Hit By Credential Stuffing

The Play ransomware gang has now attacked more than 900 organizations worldwide since it first emerged back in the year 2022. This makes it one of the most threatening cybercrime groups that is currently active, according to new data from the FBI. On Wednesday, the FBI published an important update to a 2023 advisory that had initially reported just 300 total attacks. In collaboration with CISA and Australian partners, the FBI said the figure has now grown to approximately 900 affected entities. The updated security advisory includes newly discovered tactics and other important identifiers that the FBI has found through its multiple investigations. The agency also previously stated Play was among the most active ransomware groups during all of 2024, highlighting its significant global threat.

As part of their extortion tactics, each victim organization receives a unique German email address for all subsequent private communications with them. A certain portion of these victims are also directly contacted by telephone and are threatened with the imminent release of their stolen data. Law enforcement officials have stated that initial access brokers with ties to Play operators continue to exploit multiple known security vulnerabilities. This includes CVE-2024-57727 in the remote monitoring and management tool SimpleHelp, which is actively used by many of Play’s U.S. victims. The advisory also notes that Play’s operators uniquely recompile their ransomware for every single attack, making its detection by defenders extremely difficult.

The Play ransomware gang initially caused widespread public outrage over dozens of its high-profile attacks that had crippling operational impacts. These specific attacks left cities like Oakland, California, and Lowell, Massachusetts, scrambling for many days to deal with their encrypted devices. Dallas County and the government of Switzerland also suffered from attacks that resulted in significant troves of sensitive stolen citizen data. When the Play group first emerged in mid-2022, it primarily targeted various government entities that were located throughout Latin America. However, it very quickly shifted its main focus to United States entities, including the semiconductor manufacturer Microchip Technology and an Indiana county government.

In October, Palo Alto Networks’ Unit42 security team warned of a new concerning development involving the ransomware group’s known operations. They reported that sophisticated hackers affiliated with North Korea’s Reconnaissance General Bureau appeared to be collaborating to some extent with Play actors. Their detailed investigation into these various incidents revealed the North Korean actors had performed the initial difficult work of gaining system access. The same exact compromised user account was then subsequently used by a completely different hacker who then deployed the Play ransomware payload. This complex collaboration demonstrates a specialized, multi-stage attack methodology involving different threat actor groups working closely together to achieve their goals.

Reference:

  • FBI Reports Play Ransomware Victim Count Has Now Tripled To Over 900
Tags: Cyber NewsCyber News 2025Cyber threatsJune 2025
ADVERTISEMENT

Related Posts

US Treasury Sanctions Russian Tech Firm Aeza

US Treasury Sanctions Russian Tech Firm Aeza

July 2, 2025
US Treasury Sanctions Russian Tech Firm Aeza

Trump’s Cyber Director Nominee Advances

July 2, 2025
US Treasury Sanctions Russian Tech Firm Aeza

LevelBlue to Acquire Trustwave for MSSP Lead

July 2, 2025
U.S. Busts North Korean IT Worker Scheme

U.S. Busts North Korean IT Worker Scheme

July 1, 2025
U.S. Busts North Korean IT Worker Scheme

Europol Cracks $540 Million Crypto Fraud

July 1, 2025
U.S. Busts North Korean IT Worker Scheme

SASE Leader Cato Networks Gets $359M Funding

July 1, 2025

Latest Alerts

Oil-Themed Phishing Spreads Snake Keylogger

Forminator Plugin Flaw Risks 600,000 Sites

Kimsuky Tricks Users Into Self Hacking

Scammers Use Fake Ads to Steal Pi Wallets

Blind Eagle Uses VBS Scripts to Deploy RATs

C4 Bomb Cracks Chrome Cookie Encryption

Subscribe to our newsletter

    Latest Incidents

    Cyberattack on Brazils CM Software Vendor

    Cyberattack Halts Hero España Production

    Hacker Attack on Australian Airline Qantas

    Cyberattack Hits Austrian Hospital Vendor

    Sophisticated Attack Hits War Crimes Court

    Ransomware Hits Swiss Government Vendor

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial