play
Status
Active
Total Victims
1,157
Active Sites
11 / 12
Has Parser
YesTop Target Countries
Top Target Industries
Initially observed in June 2022, the Play ransomware (a.k.a PlayCrypt) operates through double extortion, targeting numerous organizations in Latin America. Its Initial Access method is quite similar to other ransomwares, involving attacks such as Phishing, Exposed Services to the Internet, and Valid Account compromises. On April 19, 2023, the security company Symantec published two new tools developed by the Play group. These tools allow the malicious actor to enumerate and exfiltrate data from the internal network. The post mentions the following: 'Play threat actors use the .NET infostealer to enumerate software and services via WMI, WinRM, Remote Registry, and Remote Service. The malware checks for the existence of security and backup software, as well as remote administration tools and other programs, saving the information in .CSV files that are compressed into a .ZIP file for later manual exfiltration by threat actors.'Source: https://github.com/crocodyli/ThreatActors-TTPs
Your network has been encrypted. Your private, personal, corporate, confidential data has been stolen. If you do not resolve the issue, your data will be published on our leak portal. News portal, tor network links: ipi4tiumgzjsym6pyuzrfqrtwskokxokqannmd6sa24shvr7x5kxdvqd.onion j75o7xvvsm4lpsjhkjvb4wl2q6ajegvabe6oswthuaubbykk4xkzgpid.onion contact email: raniyumiamrm@gmx.de PLAY Ransomware Team
| Victim | Country | Industry | Date |
|---|---|---|---|
T a Solberg www.tasolberg.com | Unknown | N/A | Mar 7, 2026 |
Don E Bower www.donebowerinc.com | Unknown | N/A | Mar 7, 2026 |
Design To Print www.designtoprint.com | Unknown | N/A | Mar 7, 2026 |
Select Tool www.selecttool.com | Unknown | N/A | Mar 7, 2026 |
DFW Aero Mechanix www.dfwaero.com |