The Play Ransomware Group: Targeting MSPs with Intermittent Encryption

In the realm of cyber threats, ransomware attacks have become increasingly prevalent, causing significant disruption and financial loss for businesses and organizations worldwide. Among the notable players in this malicious game is the Play ransomware group, whose recent cyberattack campaign has specifically targeted managed service providers (MSPs) globally. With a sophisticated approach that incorporates intermittent encryption techniques, Play aims to distribute ransomware to the downstream customers of these MSPs, wreaking havoc on organizations from various sectors.

Intermittent Encryption Technique

Play’s utilization of intermittent encryption sets it apart from many other ransomware groups. Instead of encrypting entire files, Play selectively encrypts specific segments, making the data inaccessible on victims’ systems. This technique not only allows for faster encryption but also presents a significant challenge for detection and recovery efforts. However, it does exhibit certain vulnerabilities that may potentially enable data recovery in certain cases.

Target Industries and Entities

Play’s cyberattack campaign has cast a wide net, targeting mid-sized businesses across various industries, including finance, legal, software, shipping, law enforcement, and logistics. Additionally, even state, local, and tribal entities have not been spared from Play’s malicious activities. The scope of their targets demonstrates both the financial motivations and the potential impact these attacks can have on critical infrastructure and public services.

Phishing Campaigns and Access to Privileged Systems

Gaining access to MSPs’ privileged management systems and Remote Monitoring and Management (RMM) tools is a pivotal step for the Play ransomware group. This access is achieved through sophisticated phishing campaigns specifically designed to deceive and exploit MSP employees. Once successful, this entry point provides Play with the ability to infiltrate and compromise the downstream networks of the MSPs.

Exploits and Vulnerabilities

Once inside a customer’s environment, Play does not stop at merely encrypting files. The group deploys additional exploits and vulnerabilities to maximize the damage caused. Leveraging vulnerabilities within Microsoft Exchange Server and older Fortinet appliances, Play capitalizes on known weaknesses to spread its ransomware throughout the compromised network. This strategic approach allows the group to infiltrate targets at multiple levels, making recovery and containment efforts considerably more challenging.

Lateral Movement and Internal Spread

To ensure complete network infiltration, Play employs the use of legitimate PowerShell scripts and exploits for lateral movement and internal spread. This tactic allows the ransomware group to move laterally within the network and gain access to critical systems and data. By exploiting the existing infrastructure and vulnerabilities within the network, Play can exponentially increase the impact of their ransomware attacks.

Limitations of Intermittent Encryption

While intermittent encryption presents difficulties for recovery, it is not foolproof. Despite its selective and partial encryption approach, there are cases where data can still be recovered. This vulnerability underscores the importance of having robust data backup and recovery mechanisms in place, as well as the need for proactive cybersecurity measures that can detect and prevent ransomware attacks.

Number of Victims and Companies Affected

Since commencing operations around June 2022, the Play ransomware group has already claimed at least 150 victims spanning over a dozen companies. This escalating number of incidents serves as a stark reminder of the increasing scale and impact of ransomware attacks. The financial losses incurred, as well as the operational disruptions caused by these attacks, highlight the urgency for organizations to bolster their cybersecurity defenses and enhance incident response capabilities.

Geographic Focus of Play Ransomware Group

Contrary to early reports suggesting a primary focus on Latin America, the Play ransomware group has shifted its attention towards the United States and Europe. This strategic shift highlights the global reach and adaptability of ransomware groups, as they continuously evolve their tactics to exploit vulnerabilities and target organizations that possess valuable data and resources.

The targeted attacks on MSPs by the Play ransomware group, along with their use of intermittent encryption techniques, pose a significant threat to organizations across different industries and sectors. The ability to infiltrate and encrypt crucial data not only leads to immediate financial and operational damage, but also carries long-term risks in terms of reputational harm and regulatory consequences. It is crucial for organizations to invest in robust cybersecurity measures, prioritize employee awareness and education, and establish comprehensive incident response strategies to combat the growing threat of ransomware attacks. By giving cybersecurity the utmost importance, organizations can protect their digital assets and defend against the catastrophic consequences of ransomware attacks orchestrated by groups like Play.

Explore more

Why Don’t Employees Trust Your AI Strategy and How to Fix It?

Imagine a workplace where cutting-edge AI tools are deployed to streamline operations, yet half the staff quietly sidesteps them, clinging to old methods out of fear or suspicion. This scenario is not a hypothetical but a growing reality across industries in 2025, as organizations rush to adopt artificial intelligence while grappling with a silent crisis: employee distrust. Despite the promise

Hidden Dangers of Leaders Not Trusting Employees Unveiled

Imagine a workplace where employees hesitate to share ideas, dodge scrutiny through secret workarounds, and show up sick just to prove their dedication— all because their leaders don’t trust them. This unsettling reality is more common than many executives realize, and it’s quietly corroding organizations from the inside. Recent shifts, such as scrapping flexible work policies and enforcing strict return-to-office

7 Career-Boosting Skills to Learn in 30 Days or Less

Imagine stepping into a job interview or a performance review with a fresh set of skills that instantly set you apart from the competition, all acquired in just a month or less. In today’s fast-paced job market, the ability to quickly adapt and grow is not just a bonus—it’s a necessity. Recent data reveals that nearly 40% of hiring managers

Why Will Age Bias Be Unavoidable for Employers by 2026?

Picture a workplace where talent is sidelined not because of skill or dedication, but simply due to a number—the age of the employee. This is not a distant dystopia but a pressing reality that many organizations are grappling with today. As demographic shifts, technological advancements, and economic pressures collide, age bias is emerging as a critical challenge that employers can

Data Sonification Technology – Review

Imagine a world where the alarming rise in global temperatures isn’t just a line on a graph but a haunting melody that pierces through indifference. Picture the urgency of climate change not only seen but heard, resonating in a way that stirs emotions and compels action. Data sonification technology offers this transformative experience, converting complex scientific data into soundscapes that