Cyber Threat Report: '#StopRansomware: Play Ransomware'

Report Author CISA
Publication Date 2023-12-18
Original Reporting Source
Related Intrusion Sets Play Ransomware Group
Identified CVEs CVE-2022-41082 , CVE-2018-13379 , CVE-2020-12812 , CVE-2022-41040

This is a Cybersecurity Advisory from CISA with US and international partners which outlines TTPs (tactics, techniques and procedures) and IoCs (indicators of compromise) associated with Play ransomware actors. According to the advisory, Play is a 'closed group' in order to "guarantee the secrecy of deals" and since October 2023, the FBI was "aware of approximately 300 affected entities allegedly exploited by the ransomware actors". The advisory also provides extensive mitigations for defending against this threat.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques

ATT&CK ID Title Associated Tactics
T1657 Financial Theft Impact
T1070.001 Clear Windows Event Logs Defense Evasion
T1570 Lateral Tool Transfer Lateral Movement
T1190 Exploit Public-Facing Application Initial Access
T1003 OS Credential Dumping Credential Access
T1562.001 Disable or Modify Tools Defense Evasion
T1486 Data Encrypted for Impact Impact
T1560.001 Archive via Utility Collection
T1133 External Remote Services Initial Access, Persistence
T1484.001 Group Policy Modification Defense Evasion, Privilege Escalation
T1078 Valid Accounts Defense Evasion, Initial Access, Persistence, Privilege Escalation
T1048 Exfiltration Over Alternative Protocol Exfiltration
T1518.001 Security Software Discovery Discovery
T1552 Unsecured Credentials Credential Access
T1016 System Network Configuration Discovery Discovery