Play Ransomware Strikes Again: A Comedy of Cyber Errors or a Data Disaster?
The Play ransomware gang has exploited a Windows flaw to gain SYSTEM privileges. While no ransomware was deployed, the Grixba infostealer made an appearance, proving that even cybercriminals need practice runs. The Play gang, active since 2022, is infamous for double-extortion. They might just be the only criminals with a rehearsal schedule.

Hot Take:
The Play ransomware gang is at it again, proving that even cybercriminals need a hobby. Who knew their pastime involved exploiting zero-day vulnerabilities to mess with Windows systems? Maybe they should take up knitting instead—at least that doesn’t require SYSTEM privileges!
Key Points:
- Play ransomware gang exploits Windows zero-day CVE-2025-29824.
- Targets include IT, real estate, finance, and retail sectors globally.
- Balloonfly group behind Play ransomware uses Grixba infostealer tool.
- Play has breached 300 organizations worldwide, from Krispy Kreme to Microchip Tech.
- Microsoft and Symantec link Play gang to high-severity attacks.
Already a member? Log in here