Play attacks Hill International
The Play Ransomware Gang's Attack on Hill International
The Play ransomware gang has attacked Hill International. Hill International is an American construction consulting company. It was founded in 1976 and is headquartered In Philadelphia. Play published Hill International to its data leak site on June 23rd, claiming to have stolen confidential data, client and employee documents, financial data, technical documents, passports, IDs, taxes, and more.
Background on Play Ransomware
Play ransomware (aka PlayCrypt) is a newer ransomware group that emerged in the summer of 2022 with high-profile attacks on the City of Oakland, Argentina's Judiciary, and German hotel chain H-Hotels. Play has similarities to Hive ransomware and is known to leverage tools like Cobalt Strike for post-compromise lateral movement and SystemBC RAT for persistence, as well as Mimikatz and living-off-the-land binaries (LOLBins) techniques.
Technical Details of the Attack
Play is an evolving RaaS platform known to exploit a known Exchange vulnerability (CVE-2022-41080 - patched by Microsoft in November of 2022) that allows them to leverage a second vulnerability with a ProxyNotShell exploit (CVE-2022-41082) even if a patch had been applied, which then allows the attackers to execute code on the systems remotely. Play leverages PowerTool to disable antivirus tools and security monitoring solutions.
Tactics and Extortion Methods
Play employs tactics similar to both Hive and Nokoyawa ransomware and also attempts double extortion by first exfiltrating victim data with the threat to post it on their leaks website.
See Halcyon in action
Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!