threatintel
actor tracker
Play
Reportseverity: Medium2025-06-04

CISA documents Play ESXi variant and per-victim recompilation

published by CISA
Actor
Play?? · UnknownRansomware

Closed-group ransomware operation (no public affiliate program) active since mid-2022, named for the '.play' extension appended to encrypted files. Heavy exploitation of FortiOS SSL-VPN flaws and Mic…

Summary

The June 2025 update to AA23-352A formally documented Play's ESXi variant, which powers off virtual machines and encrypts VM-related files (.vmdk, .vmem, .vmsn, .vmx, .nvram, etc.) with AES-256, and confirmed that the Windows binary is recompiled for every attack to defeat hash-based detection. Each victim now receives a unique @gmx.de or @web.de contact address.

Tags

esxiadvisory-updatettps

Primary source

ic3.gov

Other Play events