Press ESC to close

Play Ransomware Group – Detection and Protection

CategoryDetails
Threat ActorsPlay Ransomware Group.
Campaign OverviewCybercriminal group behind several major ransomware attacks, focusing on data encryption or exfiltration for ransom.
Target Regions (Or Victims)Dallas County, Swiss government, Arnold Clark, Judiciary of Cordoba, Microsoft Cuba, City of Oakland.
MethodologyBreaches via FortiOS vulnerabilities (CVE-2020-12812, CVE-2018-13379), exposed RDP servers, Group Policy Objects for ransomware deployment.
Product targetedOrganizations across various sectors (government, private sector).
Malware ReferencePlay ransomware (file encryption).
Tools UsedGroup Policy Objects for ransomware deployment, intermittent encryption technique.
Vulnerabilities ExploitedCVE-2020-12812, CVE-2018-13379 (FortiOS vulnerabilities), exposed RDP servers.
TTPsIntermittent encryption to evade detection, encryption of selective file parts, ransom demand, and data exfiltration.
AttributionPlay Ransomware Group (No clear state affiliation; criminal group).
RecommendationsUse access controls, deploy endpoint protection, update systems regularly, implement contingency plans.
SourceCheck Point

Read full article: https://www.checkpoint.com/cyber-hub/threat-prevention/ransomware/play-ransomware-group-detection-and-protection/

Disclaimer: The above summary has been generated by an AI language model.

Leave a Reply

Your email address will not be published. Required fields are marked *