Ransomware Ruckus: Play and Babuk Unleash Chaos on Microsoft’s Turf!

Threat actors linked to Play ransomware exploited a zero-day flaw in Microsoft Windows, targeting a US organization. They used CVE-2025-29824, a privilege escalation flaw, patched last month. Despite their double extortion tactics, no ransomware payload was deployed. The case underscores the trend of ransomware actors leveraging zero-days for infiltration.

Pro Dashboard

Hot Take:

Looks like someone’s been playing dirty with Play ransomware and Microsoft’s CLFS driver! If ransomware were a sport, these threat actors would certainly be in the Hall of Shame. The Play ransomware gang is clearly the overachiever kid in the class of cybercriminals, using zero-day exploits like it’s a trendy new gadget. Meanwhile, Microsoft is left patching up holes faster than a leaky ship, and we’re all just hoping for a life jacket in this sea of cyber chaos!

Key Points:

– Play ransomware, linked to a zero-day exploit in Microsoft Windows, targeted a U.S. organization.
– The CLFS driver flaw, CVE-2025-29824, was used for privilege escalation.
– The attack involved a Cisco ASA as an entry point and featured the Grixba info stealer.
– Exploits for the vulnerability were available before Microsoft patched it.
– No ransomware payload was deployed, indicating multiple threat actors might have used this exploit.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?