Profilo Gruppo

Dettagli e statistiche per play

Torna alle Statistiche

Profilo Cyber Gang

play
Profilo gang by OSINT sources

Initially observed in June 2022, the Play ransomware (a.k.a PlayCrypt) operates through double extortion, targeting numerous organizations in Latin America. Its Initial Access method is quite similar to other ransomwares, involving attacks such as Phishing, Exposed Services to the Internet, and Valid Account compromises.

On April 19, 2023, the security company Symantec published two new tools developed by the Play group. These tools allow the malicious actor to enumerate and exfiltrate data from the internal network. The post mentions the following: 'Play threat actors use the .NET infostealer to enumerate software and services via WMI, WinRM, Remote Registry, and Remote Service. The malware checks for the existence of security and backup software, as well as remote administration tools and other programs, saving the information in .CSV files that are compressed into a .ZIP file for later manual exfiltration by threat actors.'Source: https://github.com/crocodyli/ThreatActors-TTPs

Fonte: 0

play

Gruppo Ransomware

Statistiche Rivendicazioni

1012
Totale
356
2025
355
2024
301
2023

URLs e Siti

Fonte Onion Ultimo Titolo Status Ultimo Scrape Versione Tor
mbrlkbtq5jonaqkurjwmxftytyn2ethqvbxfu4rgjbkkknndqwae6byd.onion PLAY NEWS Online 13-11-2025 3
k7kg3jqxang3wh7hnmaiokchk7qoebupfgoik6rha6mjpzwupwtj25yd.onion PLAY NEWS Online 13-11-2025 3
mbrlkbtq5jonaqkurjwmxftytyn2ethqvbxfu4rgjbkkknndqwae6byd.onion PLAY NEWS Online 13-11-2025 3
j75o7xvvsm4lpsjhkjvb4wl2q6ajegvabe6oswthuaubbykk4xkzgpid.onion PLAY NEWS Online 13-11-2025

Note di Riscatto

Informazioni Crypto

Informazioni crypto non disponibili per questo gruppo.