Play Ransomware Strikes Again: A Comedy of Cyber Errors or a Data Disaster?

The Play ransomware gang has exploited a Windows flaw to gain SYSTEM privileges. While no ransomware was deployed, the Grixba infostealer made an appearance, proving that even cybercriminals need practice runs. The Play gang, active since 2022, is infamous for double-extortion. They might just be the only criminals with a rehearsal schedule.

Pro Dashboard

Hot Take:

The Play ransomware gang is at it again, proving that even cybercriminals need a hobby. Who knew their pastime involved exploiting zero-day vulnerabilities to mess with Windows systems? Maybe they should take up knitting instead—at least that doesn’t require SYSTEM privileges!

Key Points:

  • Play ransomware gang exploits Windows zero-day CVE-2025-29824.
  • Targets include IT, real estate, finance, and retail sectors globally.
  • Balloonfly group behind Play ransomware uses Grixba infostealer tool.
  • Play has breached 300 organizations worldwide, from Krispy Kreme to Microchip Tech.
  • Microsoft and Symantec link Play gang to high-severity attacks.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?