Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Play Ransomware Exploits MSPs

August 18, 2023
Reading Time: 2 mins read
in Alerts
Play Ransomware Exploits MSPs

The Play ransomware group has taken a cunning approach by targeting security managed service providers (MSPs) to initiate their attacks and leveraging vulnerabilities dating back as far as five years in security systems, according to a warning by Adlumin security researchers. Kevin O’Connor, Director of Threat Research at Adlumin, highlights the ingenuity of attacking through security vendors, making it challenging for defenders to detect the breach as it initially resembles legitimate administrative access, granting attackers considerable control over the victim’s network and IT assets.

To avoid triggering defenses that detect complete file modifications, the gang is employing intermittent encryption techniques, a strategy revealed in a recent blog post by the security firm. This group’s latest campaign is honing in on midsize businesses in sectors including finance, software, legal, and logistics, spanning the US, UK, Australia, and Italy.

Furthermore, the Play ransomware group’s track record includes notable cyberattacks, such as those on the city of Oakland, the Judiciary of Córdoba in Argentina, and the German chain H-Hotels. Comparative analyses by TrendMicro suggest affiliations with other ransomware groups like Hive and Nokoyawa. The group has augmented its arsenal with new exploits like ProxyNotShell, OWASSRF, and a Microsoft Exchange Server remote code execution.

Additionally, PlayCrypt utilizes FortiOS vulnerabilities, notably CVE-2018-13379 and CVE-2020-12812, as part of their network infiltration strategy, emphasizing the importance of patching and proactive security measures.

Recent joint security advisories by cybersecurity officials from the US and its Five Eyes intelligence alliance shed light on the 12 most frequently exploited vulnerabilities by malicious actors in 2022. Among these is CVE-2018-13379, a path traversal flaw in Fortinet SSL VPN, originally discovered in July 2018 and patched by Fortinet in May 2019.

Despite the patch, attackers persist in exploiting this flaw, prompting the NSA to issue a public alert in 2019 urging users to apply the fix. The evolving tactics of the Play ransomware group and the persistence of known vulnerabilities underscore the ongoing challenge of staying ahead in the cybersecurity landscape.

Reference:
  • PlayCrypt Ransomware Group Wreaks Havoc in Campaign Against Managed Service Providers
Tags: August 2023Cyber AlertCyber Alerts 2023CyberattackCybersecurityPlay ransomwareRansomwareRansomware AttackVulnerabilities
ADVERTISEMENT

Related Posts

AMOS Mac Stealer Adds Persistent Backdoor

AMOS Mac Stealer Adds Persistent Backdoor

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

NordDragonScan Malware Steals Windows Data

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

New Ransomware BERT Targets ESXi Systems

July 8, 2025
hpingbot Botnet Uses Pastebin C2 Channel

APT36 Targets Indian Defense Linux Systems

July 7, 2025
hpingbot Botnet Uses Pastebin C2 Channel

Hackers Abuse Driver Signing For Malware

July 7, 2025
hpingbot Botnet Uses Pastebin C2 Channel

hpingbot Botnet Uses Pastebin C2 Channel

July 7, 2025

Latest Alerts

New Ransomware BERT Targets ESXi Systems

NordDragonScan Malware Steals Windows Data

AMOS Mac Stealer Adds Persistent Backdoor

APT36 Targets Indian Defense Linux Systems

hpingbot Botnet Uses Pastebin C2 Channel

Hackers Abuse Driver Signing For Malware

Subscribe to our newsletter

    Latest Incidents

    French Chip Firm Semco Hacked During IPO

    Louis Vuitton Korea Hit By Cyberattack

    Virginia School District Hit By Cyberattack

    Ransomware Attack Causes Outage at Ingram

    Call of Duty Players Hacked on Game Pass

    RansomHub Claims Theft of Coppell City Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial