Agencies issue advisory on updated tactics by Play ransomware group

The FBI, Cybersecurity and Infrastructure Security Agency and Australian Cyber Security Centre June 4 released an on updated actions and tactics used by the Play ransomware group. The group, active since 2022, has impacted a wide range of businesses and critical infrastructure in North America, South America and Europe. As of May, the FBI was aware of about 900 victims allegedly exploited by the group鈥檚 efforts.
The threat actors are presumed to be a closed group, designed to 鈥済uarantee the secrecy of deals,鈥 according to a statement on the group鈥檚 data leak website. They employ a double-extortion model that encrypts systems after exfiltrating data. Their ransom notes do not include an initial ransom demand or payment instructions. Instead, victims are instructed to contact the threat actors via email.
鈥淧lay ransomware was among the most active cyberthreat groups in 2024,鈥 said Scott Gee, AHA deputy national advisor for cybersecurity and risk. 鈥淭his report highlights their evolving tactics, and health care cybersecurity teams should be aware of the changes. As threat actors shift tactics, it is critical that network defenders keep pace. The double-layered extortion model and encryption of systems, as well as theft of data, pose a serious potential risk to hospitals and the delivery of health care.鈥
For more information on this or other cyber and risk issues, contact Gee at sgee@aha.org. For the latest cyber and risk resources and threat intelligence, visit aha.org/cybersecurity.