Ransomware Attack Hits Strainrite by Notorious Play Group

Incident Date: Oct 18, 2024

Attack Overview
VICTIM
The Strainrite Companies
INDUSTRY
Manufacturing
LOCATION
USA
ATTACKER
Play
FIRST REPORTED
October 18, 2024

Ransomware Attack on The Strainrite Companies by Play Group

The Strainrite Companies, a well-established manufacturer in the liquid filtration industry, recently became the target of a ransomware attack by the notorious Play group. This incident highlights the ongoing threat that ransomware poses to critical industry players.

About The Strainrite Companies

Founded in 1978, The Strainrite Companies has built a strong reputation for designing and producing high-quality filtration solutions. The company serves a diverse range of industries, including paints, coatings, inks, beverages, biopharmaceuticals, and electronics. With ISO9001 accredited manufacturing facilities, Strainrite emphasizes quality control and compliance with Good Manufacturing Practices. Their innovative approach and commitment to customer service have positioned them as a leader in the liquid filtration sector.

Strainrite operates globally, with a presence in the United States, Europe, and Asia. As a medium-sized enterprise, the company employs a dedicated team of professionals who specialize in providing tailored filtration solutions. Despite their reputation, the company's global reach and industry prominence make them an attractive target for cybercriminals.

Details of the Attack

On October 19, The Strainrite Companies fell victim to a ransomware attack orchestrated by the Play group. The specifics of the data compromised remain undisclosed, leaving the extent of the breach uncertain. This attack underscores the persistent threat posed by ransomware groups to critical industry players, emphasizing the need for vigilance and advanced cybersecurity measures.

About the Play Ransomware Group

The Play ransomware group, also known as PlayCrypt, has been active since June 2022. Initially focusing on Latin America, the group has expanded its operations to North America, South America, and Europe. Play distinguishes itself by targeting a diverse range of industries, including IT, transportation, and critical infrastructure. The group employs various methods to gain entry into networks, such as exploiting RDP servers, FortiOS vulnerabilities, and Microsoft Exchange vulnerabilities.

Play ransomware is known for its unique approach, as it does not include an initial ransom demand in its notes. Instead, victims are directed to contact the threat actors via email. This strategy, combined with their use of custom tools and techniques, makes Play a formidable adversary in the cyber threat landscape.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.