The Play Ransomware Group: Targeting MSPs with Intermittent Encryption

In the realm of cyber threats, ransomware attacks have become increasingly prevalent, causing significant disruption and financial loss for businesses and organizations worldwide. Among the notable players in this malicious game is the Play ransomware group, whose recent cyberattack campaign has specifically targeted managed service providers (MSPs) globally. With a sophisticated approach that incorporates intermittent encryption techniques, Play aims to distribute ransomware to the downstream customers of these MSPs, wreaking havoc on organizations from various sectors.

Intermittent Encryption Technique

Play’s utilization of intermittent encryption sets it apart from many other ransomware groups. Instead of encrypting entire files, Play selectively encrypts specific segments, making the data inaccessible on victims’ systems. This technique not only allows for faster encryption but also presents a significant challenge for detection and recovery efforts. However, it does exhibit certain vulnerabilities that may potentially enable data recovery in certain cases.

Target Industries and Entities

Play’s cyberattack campaign has cast a wide net, targeting mid-sized businesses across various industries, including finance, legal, software, shipping, law enforcement, and logistics. Additionally, even state, local, and tribal entities have not been spared from Play’s malicious activities. The scope of their targets demonstrates both the financial motivations and the potential impact these attacks can have on critical infrastructure and public services.

Phishing Campaigns and Access to Privileged Systems

Gaining access to MSPs’ privileged management systems and Remote Monitoring and Management (RMM) tools is a pivotal step for the Play ransomware group. This access is achieved through sophisticated phishing campaigns specifically designed to deceive and exploit MSP employees. Once successful, this entry point provides Play with the ability to infiltrate and compromise the downstream networks of the MSPs.

Exploits and Vulnerabilities

Once inside a customer’s environment, Play does not stop at merely encrypting files. The group deploys additional exploits and vulnerabilities to maximize the damage caused. Leveraging vulnerabilities within Microsoft Exchange Server and older Fortinet appliances, Play capitalizes on known weaknesses to spread its ransomware throughout the compromised network. This strategic approach allows the group to infiltrate targets at multiple levels, making recovery and containment efforts considerably more challenging.

Lateral Movement and Internal Spread

To ensure complete network infiltration, Play employs the use of legitimate PowerShell scripts and exploits for lateral movement and internal spread. This tactic allows the ransomware group to move laterally within the network and gain access to critical systems and data. By exploiting the existing infrastructure and vulnerabilities within the network, Play can exponentially increase the impact of their ransomware attacks.

Limitations of Intermittent Encryption

While intermittent encryption presents difficulties for recovery, it is not foolproof. Despite its selective and partial encryption approach, there are cases where data can still be recovered. This vulnerability underscores the importance of having robust data backup and recovery mechanisms in place, as well as the need for proactive cybersecurity measures that can detect and prevent ransomware attacks.

Number of Victims and Companies Affected

Since commencing operations around June 2022, the Play ransomware group has already claimed at least 150 victims spanning over a dozen companies. This escalating number of incidents serves as a stark reminder of the increasing scale and impact of ransomware attacks. The financial losses incurred, as well as the operational disruptions caused by these attacks, highlight the urgency for organizations to bolster their cybersecurity defenses and enhance incident response capabilities.

Geographic Focus of Play Ransomware Group

Contrary to early reports suggesting a primary focus on Latin America, the Play ransomware group has shifted its attention towards the United States and Europe. This strategic shift highlights the global reach and adaptability of ransomware groups, as they continuously evolve their tactics to exploit vulnerabilities and target organizations that possess valuable data and resources.

The targeted attacks on MSPs by the Play ransomware group, along with their use of intermittent encryption techniques, pose a significant threat to organizations across different industries and sectors. The ability to infiltrate and encrypt crucial data not only leads to immediate financial and operational damage, but also carries long-term risks in terms of reputational harm and regulatory consequences. It is crucial for organizations to invest in robust cybersecurity measures, prioritize employee awareness and education, and establish comprehensive incident response strategies to combat the growing threat of ransomware attacks. By giving cybersecurity the utmost importance, organizations can protect their digital assets and defend against the catastrophic consequences of ransomware attacks orchestrated by groups like Play.

Explore more

Fox Agency Tops UK 2026 B2B Content Marketing Rankings

Modern corporate communication has moved far beyond simple press releases and brochures to become the very heartbeat of enterprise growth and strategic brand positioning. The latest Benchmarking Report reveals a significant shift in the UK agency landscape, where content marketing has officially claimed its spot as the second most dominant specialism. This evolution reflects a market that increasingly values the

How Can You Win B2B Buyers Before the First Sales Call?

The traditional B2B sales cycle has transformed into a ghost hunt where marketers spend millions chasing digital footprints that lead to doors that have already been locked from the inside by better-prepared competitors. This systemic failure stems from a reliance on reactive intent signals. When a prospect finally downloads a whitepaper or registers for a webinar, most organizations celebrate a

How Do Your Leadership Signals Shape Workplace Culture?

The silent vibration of a smartphone notifying a leader of a market shift can trigger a physiological chain reaction that alters the psychological safety of an entire department before a single word is ever spoken. In high-pressure environments, the executive presence serves as a primary broadcast tower, emitting signals that either stabilize the collective or broadcast a frequency of frantic

Why Is Your Workplace Choosing Decisions Over Agency?

Modern professionals find themselves trapped in an endless cycle of digital noise where the simple act of clearing an inbox feels like a monumental achievement despite contributing nothing to the long-term strategic health of their organization. This persistent state of digital triage defines the current era of labor, where the average worker navigates an unrelenting stream of 153 instant messages

Is Adaptability More Important Than Experience for Leaders?

The traditional resume, once a gold-standard map of professional competence, is rapidly transforming into a historical artifact that fails to predict how a leader will perform in a world of constant disruption. This document, thick with prestigious titles and decades of industry tenure, used to offer a sense of security to hiring committees. However, the modern corporate landscape has proven