Happy New Year — 2024
Blackswan Cybersecurity CEO, Prof. Mike Saylor discusses Stellar Cyber Open XDR and why it was Blackswan’s preferred platform in 2023.
“An MSSP should be capable enough to focus on what the client’s true needs are both from a services and technology perspective, but also being as economical about it as you can. When we deploy Stellar, we are able to build deployment packages very quickly, whenever we need them.”
“The biggest benefit of working with Stellar is their people. The communication, the availability, the responsiveness, the innovation, the thought leadership. Those are all things that I look for in a partner. And those are all things that I’ve just been thoroughly and continually impressed with.”
Stellar Cyber Open XDR is a unified, AI-powered approach to detection and response that collects and correlates data from all existing security tools to protect the entire enterprise attack surface effectively and efficiently. Open XDR, unlike “closed” XDR, works with any underlying security control, including any EDR, eliminating the need for organizations to essentially hand over the control of their security stack to any single vendor.
Architecturally, Open XDR is about unifying and simplifying the entire security stack to improve detection and response radically. At any given organization, a security stack will consist of numerous capabilities like SIEM, EDR, NDR, SOAR, and more. These capabilities were never designed to work with each other, and teams spend too much time managing multiple tools, leading to today’s problems –
Too many tools, not enough people, and not the right data. That’s where Open XDR comes in to unify all capabilities, correlate alerts from individual tools into holistic incidents, and simplify by reducing administrative overhead. AI and automation come in as the only technically feasible way of protecting the entire attack surface effectively and efficiently, which is why it is a key architectural attribute of Open XDR.
The outcome of Open XDR is protecting your environments from threats from a single platform versus multiple tools with weak or non-existent connections band-aiding it all together. And the outcome of Open XDR is radically improved detection and response at a price anyone can afford.
Ingest and Normalize Data
Stellar Cyber ingests data from API based connectors (cloud or on prem), or from streaming log sources via protocols like Syslog. On prem data sources can be captured because of Stellar Cyber’s Sensors which can be deployed physically or virtually to hook into those environments. Data, regardless of its origin, gets normalized into a standard data model. Common fields like source IP, timestamp, or logon type are always standardized when possible to make workflows easy. Third party specific data is kept in a vendor data namespace. Data is also enriched with geolocation and asset context to increase the value of all telemetry.
Centralized Threat Detection — Stellar Cyber uses several methods to root out potential threats:
Easy-to-find sources of known bad are found through rules in Stellar Cyber, with new and updated rules being shipped continuously to all customers, sourced from our internal detection team and open communities like SigmaHQ.
Harder-to-find sources of known bad are identified using supervised machine learning detection. Stellar Cyber’s security research team develops models based on publicly available or internally generated datasets and continuously monitors model performance across the fleet.
Unknown and zero-day threats are uncovered using unsupervised machine learning techniques. These models look for anomalous behavior indicative of a threat. These models baseline over several weeks on a per-customer/per-tenant basis.
Sensor-Driven Threat Detection
Stellar Cyber’s sensors not only collect logs from cloud and on-prem sources, they also create visibility and deploy network based detections to the edge. Sensors package together Deep Packet Inspection (DPI), Intrusion Detection System (IDS), and Malware Sandbox into a single configurable software package.
AI-Enabled Investigations
Correlation across detections and other data signals occurs through a Graph ML based AI that aids analysts by automatically assembling related data points. The AI determines connection strength between discrete events that can be sourced from any data source, based on property, temporal, and behavioral similarities. This AI is trained on real world data generated by Stellar Cyber and is continuously improved with its operational exposure.
Automated Response
Users have complete customizability over the context, conditions, and output of playbooks. Playbooks can be deployed globally or on a per tenant basis. Use any out-of-the box playbook for a standard response, or create a custom playbook for taking action back into an EDR, calling a web-hook, or simply sending an email.

The National Security Agency (NSA) just published its 2023 Cybersecurity Year in Review. Some highlights include:
Establishing the Artificial Intelligence (AI) Security Center.
Detecting stealthy People’s Republic of China (PRC) intrusions into U.S. critical infrastructure and joined forces with partners (CISA, FBI, NIST, etc.) to expose those intrusions.
Collaborating with industry, government stakeholders, and academia to modernize cryptography to scale cybersecurity solutions and address the quantum threat.
SUMMARY
Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) are releasing this joint CSA to disseminate the Play ransomware group’s IOCs and TTPs identified through FBI investigations as recently as October 2023.
Since June 2022, the Play (also known as Playcrypt) ransomware group has impacted a wide range of businesses and critical infrastructure in North America, South America, and Europe. As of October 2023, the FBI was aware of approximately 300 affected entities allegedly exploited by the ransomware actors.
In Australia, the first Play ransomware incident was observed in April 2023, and most recently in November 2023.
The Play ransomware group is presumed to be a closed group, designed to “guarantee the secrecy of deals,” according to a statement on the group’s data leak website. Play ransomware actors employ a double-extortion model, encrypting systems after exfiltrating data. Ransom notes do not include an initial ransom demand or payment instructions, rather, victims are instructed to contact the threat actors via email.
The FBI, CISA, and ASD’s ACSC encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents. This includes requiring multifactor authentication, maintaining offline backups of data, implementing a recovery plan, and keeping all operating systems, software, and firmware up to date.
Download a PDF version of this report:
AA23-352A #StopRansomware: Play Ransomware(PDF, 536.19 KB )
For a downloadable copy of IOCs, see:
AA23-352A STIX XML(XML, 34.87 KB )
AA23-352A STIX JSON(JSON, 30.22 KB )
TECHNICAL DETAILS
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 14. See the MITRE ATT&CK for Enterprise section for all referenced tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
Initial Access
The Play ransomware group gains initial access to victim networks through the abuse of valid accounts [T1078] and exploitation of public-facing applications [T1190], specifically through known FortiOS (CVE-2018-13379 and CVE-2020-12812) and Microsoft Exchange (ProxyNotShell [CVE-2022-41040 and CVE-2022-41082]) vulnerabilities. Play ransomware actors have been observed to use external-facing services [T1133] such as Remote Desktop Protocol (RDP) and Virtual Private Networks (VPN) for initial access.
Discovery and Defense Evasion
Play ransomware actors use tools like AdFind to run Active Directory queries [TA0007] and Grixba [1], an information-stealer, to enumerate network information [T1016] and scan for anti-virus software [T1518.001]. Actors also use tools like GMER, IOBit, and PowerTool to disable anti-virus software [T1562.001] and remove log files [T1070.001]. In some instances, cybersecurity researchers have observed Play ransomware actors using PowerShell scripts to target Microsoft Defender.[2]
Lateral Movement and Execution
Play ransomware actors use command and control (C2) applications, including Cobalt Strike and SystemBC, and tools like PsExec, to assist with lateral movement and file execution. Once established on a network, the ransomware actors search for unsecured credentials [T1552] and use the Mimikatz credential dumper to gain domain administrator access [T1003]. According to open source reporting [2], to further enumerate vulnerabilities, Play ransomware actors use Windows Privilege Escalation Awesome Scripts (WinPEAS) [T1059] to search for additional privilege escalation paths. Actors then distribute executables [T1570] via Group Policy Objects [T1484.001].
Exfiltration and Encryption
Play ransomware actors often split compromised data into segments and use tools like WinRAR to compress files [T1560.001] into .RAR format for exfiltration. The actors then use WinSCP to transfer data [T1048] from a compromised network to actor-controlled accounts. Following exfiltration, files are encrypted [T1486] with AES-RSA hybrid encryption using intermittent encryption, encrypting every other file portion of 0x100000 bytes. [3] (Note: System files are skipped during the encryption process.) A .play extension is added to file names and a ransom note titled ReadMe[.]txt is placed in file directory C:.
Impact
The Play ransomware group uses a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note directs victims to contact the Play ransomware group at an email address ending in @gmx[.]de. Ransom payments are paid in cryptocurrency to wallet addresses provided by Play actors. If a victim refuses to pay the ransom demand, the ransomware actors threaten to publish exfiltrated data to their leak site on the Tor network ([.]onion URL).
Leveraged Tools
Table 1 lists legitimate tools Play ransomware actors have repurposed for their operations. The legitimate tools listed in this product are all publicly available. Use of these tools and applications should not be attributed as malicious without analytical evidence to support they are used at the direction of, or controlled by, threat actors.
| Table 1: Tools Leveraged by Play Ransomware Actors | |
| Name | Description |
| AdFind | Used to query and retrieve information from Active Directory. |
| Bloodhound | Used to query and retrieve information from Active Directory. |
| GMER | A software tool intended to be used for detecting and removing rootkits. |
| IOBit | An anti-malware and anti-virus program for the Microsoft Windows operating system. Play actors have accessed IOBit to disable anti-virus software. |
| PsExec | A tool designed to run programs and execute commands on remote systems. |
| PowerTool | A Windows utility designed to improve speed, remove bloatware, protect privacy, and eliminate data collection, among other things. |
| PowerShell | A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS. |
| Cobalt Strike | A penetration testing tool used by security professionals to test the security of networks and systems. Play ransomware actors have used it to assist with lateral movement and file execution. |
| Mimikatz | Allows users to view and save authentication credentials such as Kerberos tickets. Play ransomware actors have used it to add accounts to domain controllers. |
| WinPEAS | Used to search for additional privilege escalation paths. |
| WinRAR | Used to split compromised data into segments and to compress files into .RAR format for exfiltration. |
| WinSCP | Windows Secure Copy is a free and open-source Secure Shell (SSH) File Transfer Protocol, File Transfer Protocol, WebDAV, Amazon S3, and secure copy protocol client. Play ransomware actors have used it to transfer data [T1048] from a compromised network to actor-controlled accounts. |
| Microsoft Nltest | Used by Play ransomware actors for network discovery. |
| Nekto / PriviCMD | Used by Play ransomware actors for privilege escalation. |
| Process Hacker | Used to enumerate running processes on a system. |
| Plink | Used to establish persistent SSH tunnels. |
Indicators of Compromise
See Table 2 for Play ransomware IOCs obtained from FBI investigations as of October 2023.
| Table 2: Hashes Associated with Play Ransomware Actors | |
| Hashes (SHA256) | Description |
| 453257c3494addafb39cb6815862403e827947a1e7737eb8168cd10522465deb | Play ransomware custom data gathering tool |
| 47c7cee3d76106279c4c28ad1de3c833c1ba0a2ec56b0150586c7e8480ccae57 | Play ransomware encryptor |
| 75404543de25513b376f097ceb383e8efb9c9b95da8945fd4aa37c7b2f226212 | SystemBC malware EXE |
| 7a42f96599df8090cf89d6e3ce4316d24c6c00e499c8557a2e09d61c00c11986 | SystemBC malware DLL |
| 7a6df63d883bbccb315986c2cfb76570335abf84fafbefce047d126b32234af8 | Play ransomware binary |
| 7dea671be77a2ca5772b86cf8831b02bff0567bce6a3ae023825aa40354f8aca | SystemBC malware DLL |
| c59f3c8d61d940b56436c14bc148c1fe98862921b8f7bad97fbc96b31d71193c | Play network scanner |
| e652051fe47d784f6f85dc00adca1c15a8c7a40f1e5772e6a95281d8bf3d5c74 | Play ransomware binary |
| e8d5ad0bf292c42a9185bb1251c7e763d16614c180071b01da742972999b95da | Play ransomware binary |
MITRE ATT&CK TACTICS AND TECHNIQUES
See Table 3–Table 11 for all referenced threat actor tactics and techniques in this advisory.
| Table 3: Play ATT&CK Techniques for Enterprise for Initial Access | ||
| Technique Title | ID | Use |
| Valid Accounts | T1078 | Play ransomware actors obtain and abuse existing account credentials to gain initial access. |
| Exploit Public Facing Application | T1190 | Play ransomware actors exploit vulnerabilities in internet-facing systems to gain access to networks. |
| External Remote Services | T1133 | Play ransomware actors have used remote access services, such as RDP/VPN connection to gain initial access. |
| Table 4: Play ATT&CK Techniques for Enterprise for Discovery | ||
| Technique Title | ID | Use |
| System Network Configuration Discovery | T1016 | Play ransomware actors use tools like Grixba to identify network configurations and settings. |
| Software Discovery: Security Software Discovery | T1518.001 | Play ransomware actors scan for anti-virus software. |
| Table 5: Play ATT&CK Techniques for Enterprise for Defense Evasion | ||
| Technique Title | ID | Use |
| Impair Defenses: Disable or Modify Tools | T1562.001 | Play ransomware actors use tools like GMER, IOBit, and PowerTool to disable anti-virus software. |
| Indicator Removal: Clear Windows Event Logs | T1070.001 | Play ransomware actors delete logs or other indicators of compromise to hide intrusion activity. |
| Table 6: Play ATT&CK Techniques for Enterprise for Credential Access | ||
| Technique Title | ID | Use |
| Unsecured Credentials | T1552 | Play ransomware actors attempt to identify and exploit credentials stored unsecurely on a compromised network. |
| OS Credential Dumping | T1003 | Play ransomware actors use tools like Mimikatz to dump credentials. |
| Table 7: Play ATT&CK Techniques for Enterprise for Lateral Movement | ||
| Technique Title | ID | Use |
| Lateral Tool Transfer | T1570 | Play ransomware actors distribute executables within the compromised environment. |
| Table 8: Play ATT&CK Techniques for Enterprise for Command and Control | ||
| Technique Title | ID | Use |
| Domain Policy Modification: Group Policy Modification | T1484.001 | Play ransomware actors distribute executables via Group Policy Objects. |
| Table 9: Play ATT&CK Techniques for Enterprise for Collection | ||
| Technique Title | ID | Use |
| Archive Collected Data: Archive via Utility | T1560.001 | Play ransomware actors use tools like WinRAR to compress files. |
| Table 10: Play ATT&CK Techniques for Enterprise for Exfiltration | ||
| Technique Title | ID | Use |
| Exfiltration Over Alternative Protocol | T1048 | Play ransomware actors use file transfer tools like WinSCP to transfer data. |
| Table 11: Play ATT&CK Techniques for Enterprise for Impact | ||
| Technique Title | ID | Use |
| Data Encrypted for Impact | T1486 | Play ransomware actors encrypt data on target systems to interrupt availability to system and network resources. |
| Financial Theft | T1657 | Play ransomware actors use a double-extortion model for financial gain. |
MITIGATIONS
These mitigations apply to all critical infrastructure organizations and network defenders. The FBI, CISA, and ASD’s ACSC recommend that software manufacturers incorporate secure-by-design and -default principles and tactics into their software development practices to limit the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems), thus, strengthening the security posture for their customers.
For more information on secure by design, see CISA’s Secure by Design and Default webpage and joint guide.
The FBI, CISA, and ASD’s ACSC recommend organizations apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the risk of compromise by Play ransomware. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
VALIDATE SECURITY CONTROLS
In addition to applying mitigations, the FBI, CISA, and ASD’s ACSC recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The FBI, CISA, and ASD’s ACSC recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
The FBI, CISA, and ASD’s ACSC recommend continually testing your security program at scale and in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
RESOURCES
REPORTING
The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Play ransomware actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.
The FBI, CISA, and ASD’s ACSC do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to a local FBI Field Office, the FBI’s Internet Crime Complaint Center (IC3), or CISA via CISA’s 24/7 Operations Center (report@cisa.gov or 888-282-0870).
Australian organizations that have been impacted or require assistance in regard to a ransomware incident can contact ASD’s ACSC via 1300 CYBER1 (1300 292 371), or by submitting a report to cyber.gov.au.
DISCLAIMER
The information in this report is being provided “as is” for informational purposes only. CISA and the FBI do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA or the FBI.
REFERENCES
[1] Symantec: Play Ransomware Group Using New Custom Data-Gathering Tools
[2] TrendMicro: Play Ransomware Spotlight
[3] SentinelLabs: Ransomware Developers Turn to Intermittent Encryption to Evade Detection