Play Ransomware

Description

Play, also known as Playcrypt, is a ransomware group that has posed a significant threat to a wide range of industries and regions since its emergence in mid-2022. “Play” refers both to the group that develops and distributes the ransomware and to the name of its encryptor. The encryptor, also known as Playcrypt, exists in multiple versions capable of targeting Windows, Linux, and ESXi systems. The ransomware group employs a double-extortion model, demanding a ransom for decrypting encrypted files and threatening to release exfiltrated data if payment is not made.

Play is known to have exploited a Windows vulnerability (CVE-2025-29824) as a zero-day. This vulnerability was later patched in the April 2025 Microsoft Patch Tuesday release.

Aliases

  • Playcrypt
  • Balloonfly
  • Play ransomware group

Common Vulnerabilities and Exposures

Targeted Industries

  • Business
  • Construction
  • Critical Infrastructure
  • Government
  • Healthcare
  • IT
  • Legal
  • Manufacturing
  • Media
  • Professional Services
  • Real Estate
  • Retail
  • Transportation

Objectives

Financial Gain

Known Tools Used

  • AdFind
  • BloodHound
  • Cobalt Strike
  • Custom VSS copying tool
  • Empire
  • GMER
  • Grixba
  • IOBit
  • Mimikatz
  • Nekto/PriviCMD
  • Nltest
  • Playcrypt
  • Plink
  • PowerTool
  • Process Hacker
  • PsExec
  • SystemBC (Coroxy)
  • Wevtutil
  • WinPEAS
  • WinRAR
  • WinSCP

Known Infection Vectors

  • Abusing exposed remote access services
  • Exploiting vulnerable internet-facing services
  • Leveraging unpatched systems and configuration weaknesses
  • Using compromised valid credentials

Active CVEs