Tuesday, March 17, 2026

CISA Publishes Tactics, Techniques, and Indicators for Defending Against Play Ransomware

On June 4, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA), in partnership with the FBI and the Australian Cyber Security Centre (ACSC), released an extensive update to its #StopRansomware advisory on the Play ransomware group.

With over 900 reported victims as of May 2025 and new technical findings from recent FBI investigations, this advisory delivers a deep operational and technical breakdown of Play’s evolving tactics, techniques, and procedures (TTPs).

Technical Analysis: Play Ransomware’s Attack Chain

Initial Access and Exploitation

Play ransomware, also referenced as PlayCrypt, is notorious for its diversified initial access strategy. Threat actors commonly:

  • Exploit valid credentials ([T1078]) harvested or purchased on the dark web.
  • Abuse public-facing application vulnerabilities ([T1190]), notably in FortiOS (CVE-2018-13379, CVE-2020-12812) and Microsoft Exchange (CVE-2022-41040, CVE-2022-41082).
  • Leverage remote services such as RDP and VPN ([T1133]) for direct entry.

A critical update highlights post-2025 attacks exploiting vulnerabilities in the SimpleHelp remote monitoring tool (CVE-2024-57727) for remote code execution ([T1059.001]).

Discovery, Defense Evasion, and Lateral Movement

Play uses a suite of open-source and custom tools to expand access and evade detection:

  • AdFind, Bloodhound, Grixba: For Active Directory and network reconnaissance.
  • GMER, IOBit, PowerTool: Disables anti-malware solutions ([T1562.001]).
  • PowerShell scripts: Used for targeting Microsoft Defender and removing traces ([T1070.001]).

Lateral movement is achieved via Cobalt Strike, SystemBC, and PsExec, while Mimikatz and WinPEAS aid privilege escalation and credential theft. Distribution of payloads often leverages Group Policy Objects ([T1484.001]).

Data Exfiltration and Encryption

Exfiltration involves segmenting and compressing data with WinRAR ([T1560.001]) and transferring via WinSCP ([T1048]). Encryption uses a custom AES-RSA hybrid model with intermittent encryption, skipping system files and appending .PLAY to filenames ([T1486]).

Example: Play Ransomware ESXi Variant

The ESXi variant executes several shell commands for VM enumeration and shutdown, then encrypts VM-related files (e.g., .vmdk.vmx) with AES-256. It supports advanced command-line flags for debugging and selective targeting.

YARA rule sample for ESXi variant:

textrule PlayForESXi {
    meta:
        description = "Detects PLAY ransomware targeting ESXi Hypervisors"
        date = "2025-01"
    strings:
        $PLAY_ext_str = ".PLAY" fullword
        $targeted_ext_vmdk = ".vmdk" fullword
        $encrypt_str = "encrypt:"
        $vmfs_path_str = "/vmfs/volumes"
    condition:
        all of them
}

Grixba Infostealer Detection (YARA/Suricata snippet)

textrule GRXBA {
    meta:
        description = "Detects the infostealer GRXBA version 1.1.3.0"
        date = "2025-01"
    strings:
        $GRB_NET_exe_hex = { 47 52 42 5F 4E 45 54 2E 65 78 65 00 }
    condition:
        all of them
}

Suricata rule for SMB path scanning (excerpt):

textalert smb any any -> any any (msg:"GRIXBA web history scanning detected - potential indicator of imminent PLAY Ransomware attack";
    flowbits:isset,GRXBA_webhist_path_1_detected; ... ;sid:1900011; rev:1;)

Indicators of Compromise and Defense Recommendations

CISA provides a continually updated list of IOCs, including hashes for Play-specific malware and infrastructure. Organizations are urged to deploy the published YARA and Suricata signatures for early detection.

Hashes (SHA 256 and SHA 1)Description
47B7B2DD88959CD7224A5542AE8D5BCE928BFC986BF0D0321532A7515C244A1E  SVCHost.dllBackdoor
75B525B220169F07AECFB3B1991702FBD9A1E170CAF0040D1FCB07C3E819F54A453257C3494ADDAFB39CB6815862403E827947A1E7737EB8168CD10522465DEBC59F3C8D61D940B56436C14BC148C1FE98862921B8F7BAD97FBC96B31D71193CGRIXBAGt_net.exeCustom data gathering tool
1409E010675BF4A40DB0A845B60DB3AAE5B302834E80ADEEC884AEBC55ECCBF7PSexesvc.exeCustom Play “psexesvc”
0E408AED1ACF902A9F97ABF71CF0DD354024109C5D52A79054C421BE35D93549HRsword.exeDisables endpoint protection
90040340EE101CAC7831D7035230AC8AD4224D432E5636F34F13AA1C4A0C2041Usysdiag.exeAssociated with HRsword; changes settings of System certificates

Key takeaway: The Play ransomware group demonstrates high adaptation, tool repurposing, and campaign-to-campaign binary customization.

Defenders must implement layered security controls, actively hunt for IOCs, and routinely validate their detection capabilities against the MITRE ATT&CK-mapped techniques outlined in this advisory.

Recent News

Recent News