DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home Alerts

Play Ransomware Exploits MSPs

August 18, 2023
Reading Time: 2 mins read
in Alerts

The Play ransomware group has taken a cunning approach by targeting security managed service providers (MSPs) to initiate their attacks and leveraging vulnerabilities dating back as far as five years in security systems, according to a warning by Adlumin security researchers. Kevin O’Connor, Director of Threat Research at Adlumin, highlights the ingenuity of attacking through security vendors, making it challenging for defenders to detect the breach as it initially resembles legitimate administrative access, granting attackers considerable control over the victim’s network and IT assets.

To avoid triggering defenses that detect complete file modifications, the gang is employing intermittent encryption techniques, a strategy revealed in a recent blog post by the security firm. This group’s latest campaign is honing in on midsize businesses in sectors including finance, software, legal, and logistics, spanning the US, UK, Australia, and Italy.

Furthermore, the Play ransomware group’s track record includes notable cyberattacks, such as those on the city of Oakland, the Judiciary of Córdoba in Argentina, and the German chain H-Hotels. Comparative analyses by TrendMicro suggest affiliations with other ransomware groups like Hive and Nokoyawa. The group has augmented its arsenal with new exploits like ProxyNotShell, OWASSRF, and a Microsoft Exchange Server remote code execution.

Additionally, PlayCrypt utilizes FortiOS vulnerabilities, notably CVE-2018-13379 and CVE-2020-12812, as part of their network infiltration strategy, emphasizing the importance of patching and proactive security measures.

Recent joint security advisories by cybersecurity officials from the US and its Five Eyes intelligence alliance shed light on the 12 most frequently exploited vulnerabilities by malicious actors in 2022. Among these is CVE-2018-13379, a path traversal flaw in Fortinet SSL VPN, originally discovered in July 2018 and patched by Fortinet in May 2019.

Despite the patch, attackers persist in exploiting this flaw, prompting the NSA to issue a public alert in 2019 urging users to apply the fix. The evolving tactics of the Play ransomware group and the persistence of known vulnerabilities underscore the ongoing challenge of staying ahead in the cybersecurity landscape.

Source:
  • PlayCrypt Ransomware Group Wreaks Havoc in Campaign Against Managed Service Providers
Tags: AlertsAlerts 2023August 2023CyberattackCybersecurityData BreachPlay ransomwareRansomwareRansomware AttackVulnerabilities
15
VIEWS
ADVERTISEMENT

Related Posts

Evolving Threat of BunnyLoader

Evolving Threat of BunnyLoader

October 2, 2023
ASMCrypt Unveils a New Malware Loader Threat

ASMCrypt Unveils a New Malware Loader Threat

October 2, 2023
FBI Warns of Dual Ransomware Threat

FBI Warns of Dual Ransomware Threat

October 2, 2023
Bing Chatbots Vulnerable to Malware

Bing Chatbots Vulnerable to Malware

October 2, 2023

More Articles

Incidents

IT Services Provider Hit by Donut Gang

September 22, 2023
Incidents

Ransomware Group LostTrust’s Rapid Attacks

September 28, 2023
Incidents

APT IRAN Claims 4TB Data Access

September 28, 2023
Incidents

Baruch College Malware Incident Update

September 29, 2023

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.