Ransomware Attack Hits Strainrite by Notorious Play Group
Ransomware Attack on The Strainrite Companies by Play Group
The Strainrite Companies, a well-established manufacturer in the liquid filtration industry, recently became the target of a ransomware attack by the notorious Play group. This incident highlights the ongoing threat that ransomware poses to critical industry players.
About The Strainrite Companies
Founded in 1978, The Strainrite Companies has built a strong reputation for designing and producing high-quality filtration solutions. The company serves a diverse range of industries, including paints, coatings, inks, beverages, biopharmaceuticals, and electronics. With ISO9001 accredited manufacturing facilities, Strainrite emphasizes quality control and compliance with Good Manufacturing Practices. Their innovative approach and commitment to customer service have positioned them as a leader in the liquid filtration sector.
Strainrite operates globally, with a presence in the United States, Europe, and Asia. As a medium-sized enterprise, the company employs a dedicated team of professionals who specialize in providing tailored filtration solutions. Despite their reputation, the company's global reach and industry prominence make them an attractive target for cybercriminals.
Details of the Attack
On October 19, The Strainrite Companies fell victim to a ransomware attack orchestrated by the Play group. The specifics of the data compromised remain undisclosed, leaving the extent of the breach uncertain. This attack underscores the persistent threat posed by ransomware groups to critical industry players, emphasizing the need for vigilance and advanced cybersecurity measures.
About the Play Ransomware Group
The Play ransomware group, also known as PlayCrypt, has been active since June 2022. Initially focusing on Latin America, the group has expanded its operations to North America, South America, and Europe. Play distinguishes itself by targeting a diverse range of industries, including IT, transportation, and critical infrastructure. The group employs various methods to gain entry into networks, such as exploiting RDP servers, FortiOS vulnerabilities, and Microsoft Exchange vulnerabilities.
Play ransomware is known for its unique approach, as it does not include an initial ransom demand in its notes. Instead, victims are directed to contact the threat actors via email. This strategy, combined with their use of custom tools and techniques, makes Play a formidable adversary in the cyber threat landscape.
Sources
See Halcyon in action
Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!