25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Updated Play Ransomware Cybersecurity Advisory Issued as Victim Count Reaches 900

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued an update to a previously issued joint cybersecurity advisory on the Play ransomware group, also known as Playcrypt.

Playcrypt has been active since June 2022 and has conducted ransomware attacks on businesses in multiple sectors, including healthcare providers and other critical infrastructure entities. The group primarily conducts attacks in North America, South America, and Europe, and is known to have attacked approximately 900 organizations. When CISA and the FBI issued their last advisory about the group in December 2023, Playcrypt had attacked approximately 300 organizations. The group accelerated attacks in 2024 and has become one of the most active ransomware groups.

Like many other ransomware operations, Playcrypt engages in double extortion tactics, stealing sensitive data before encrypting files. Victims are sent ransom demands and are required to pay to prevent the publication of their stolen data and to obtain the decryption keys. Victims are required to contact the group via email to negotiate payment, and are often contacted by phone and threatened with the release of stolen data, with Playcrypt actors often using a variety of phone numbers within each organization.

Playcrypt uses a variety of methods for initial access, including abusing credentials for valid accounts, exploiting vulnerabilities in public-facing applications, and leveraging Remote Desktop Protocol (RDP) and Virtual Private Networks (VPNs). Vulnerabilities known to have been exploited by the group include the FortiOS vulnerabilities CVE-2018-13379 and CVE-2020-12812, and the Microsoft Exchange vulnerabilities CVE-2022-41040 and CVE-2022-41082. This year, the group has been observed exploiting three vulnerabilities in the SimpleHelp remote monitoring and management tool in attacks on U.S.-based entities – CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

The group uses tools such as AdFind for running Active Directory queries, the Grixba information stealer to enumerate network information, GMER, IOBit, and PowerTool for removing log files and disabling anti-virus software, PowerShell scripts to disable Microsoft Defender, PsExec for lateral movement and file execution, and Mimikatz for obtaining domain administrator credentials. In an effort to evade security solutions, Playcrypt recompiles its ransomware binary for each attack, with each binary having a unique hash, including its Windows and ESXi variants.

The updated cybersecurity advisory includes the latest tactics, techniques, and procedures (TTPs), updated indicators of compromise (IoCs), and Yara rules. To combat attacks, CISA and the FBI recommend keeping all software, firmware, and operating systems up to date, implementing multi-factor authentication, ensuring backups are regularly made and stored securely offline, and developing and regularly testing a response and recovery plan.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist