Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025

The Chinese Silver Fox Group uses fake web -sats to deliver Sainbox Rat and Hidden Rortkit

June 27, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » North Korean group collaborates with Play ransomware in major cyber attack
Global Security

North Korean group collaborates with Play ransomware in major cyber attack

AdminBy AdminOctober 30, 2024No Comments3 Mins Read
Play Ransomware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 30, 2024Ravi LakshmananRansomware / Threat Intelligence

Play ransomware

North Korean threat actors have been implicated in a recent incident that deployed a prominent ransomware family called Play, highlighting their financial motives.

Activity observed between May and September 2024 was attributed to an individual tracked as a threat Jumping Fishwhich is also known as Andariel, APT45, DarkSeoul, Nickel Hyatt, Onyx Sleet (formerly Plutonium), Operation Troy, Silent Chollima, and Stonefly.

“We believe with moderate confidence that Jumpy Pisces or a faction of the group is now working with the Play ransomware group,” Division 42 Palo Alto Networks. said in a new report released today.

“This incident is significant because it marks the first documented collaboration between North Korea’s state-sponsored Jumpy Pisces group and an underground ransomware network.”

Cyber ​​security

Andariel, active since at least 2009, is linked to North Korea’s General Intelligence Bureau (RGB). Two other strains of ransomware, known as SHATTEREDGLASS and Maui.

Earlier this month, Symantec, part of Broadcom, noted that in August 2024, three different organizations in the US were targeted by a government-sponsored hacking group in a likely financially motivated attack, even though no ransomware was deployed on their networks.

Play, on the other hand, appears ransomware operation As of October 2023, around 300 organizations are believed to be affected. It is also known as Balloonfly, Fiddling Scorpius and PlayCrypt.

Play ransomware

While cybersecurity firm Adlumin revealed late last year that the operation may have moved to a ransomware-as-a-service (RaaS) model, the threat actors behind Play have since announced on their dark web leak site that this was not the case.

In an incident investigated by Unit 42, Andariel is believed to have initially gained access through a compromised user account in May 2024, then performed lateral movement and save actions using A scrap command and control structure (C2) and a custom backdoor called Dtrack (aka Valefor and Preft).

“These remote tools continued to interact with their control server (C2) until early September,” Unit 42 said. “This ultimately led to the deployment of the Play ransomware.”

The deployment of the Play ransomware was preceded by an unidentified threat that infiltrated the network using the same compromised user account, after which they were seen harvesting credentials, escalating privileges, and removing Endpoint Detection and Response (EDR) sensors, which is a characteristic sign of previous ransomware activity.

Cyber ​​security

The attack also used a Trojan binary capable of collecting web browser history, autofill information, and credit card information for Google Chrome, Microsoft Edge, and Brave.

Using a compromised Andariel and Play Asia user account, the connection between the two sets of intrusions appears to be that communication with the Sliver C2 server (172.96.137(.)224) continued until the day before the ransomware was deployed. The IP address of C2 has been offline since the day of deployment.

“It remains unclear whether Jumpy Pisces officially became an affiliate of the Play ransomware, or whether they acted as an IAB (initial access broker) selling network access to Play ransomware participants,” Unit 42 concluded. RaaS, she claims, Jumpy Pisces could only act as an IAB.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025

The Chinese Silver Fox Group uses fake web -sats to deliver Sainbox Rat and Hidden Rortkit

June 27, 2025

Business -SUCKS FOR AGENTIC AI SOC -Analytics

June 27, 2025

Transfer of person transfer is increased by threats when directed by scanning and disadvantages CVE

June 27, 2025

The malicious ONECLIK software is oriented

June 27, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025

The Chinese Silver Fox Group uses fake web -sats to deliver Sainbox Rat and Hidden Rortkit

June 27, 2025

Business -SUCKS FOR AGENTIC AI SOC -Analytics

June 27, 2025

Transfer of person transfer is increased by threats when directed by scanning and disadvantages CVE

June 27, 2025

The malicious ONECLIK software is oriented

June 27, 2025

Critical Open VSX -no -register exposes millions of developers for supply chain attacks

June 26, 2025

The new FileFix method is a threat

June 26, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025

The Chinese Silver Fox Group uses fake web -sats to deliver Sainbox Rat and Hidden Rortkit

June 27, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.