Ransomware Attack on EPI Breads: Play Group Compromises Data

Incident Date: Aug 29, 2024

Attack Overview
VICTIM
Epi Breads
INDUSTRY
Manufacturing
LOCATION
USA
ATTACKER
Play
FIRST REPORTED
August 29, 2024

Ransomware Attack on EPI Breads by Play Ransomware Group

EPI Breads, a prominent custom bakery in the United States, has recently fallen victim to a ransomware attack orchestrated by the Play ransomware group. The attack has compromised sensitive and private information, including personal documents, tax records, identification details, and other confidential data, posing significant risks to the privacy and security of the affected individuals and the company's operations.

About EPI Breads

Founded in 1985, EPI Breads LLC is a leading custom bakery specializing in a wide variety of bread products tailored to meet the specific needs of restaurants and retail chains. With over 30 years of experience, the company offers an extensive range of products, including hoagies, sub rolls, sliced loaves, artisan breads, and gluten-free options. EPI Breads operates a significant baking facility in Atlanta, spanning 176,000 square feet, which includes multiple production lines aimed at expanding its product offerings. The company employs around 224 individuals and reported an annual revenue of approximately $30.6 million.

Attack Overview

The Play ransomware group, also known as PlayCrypt, has claimed responsibility for the attack on EPI Breads via their dark web leak site. The attackers have infiltrated the company's systems, compromising sensitive data and potentially disrupting their operations. The breach highlights vulnerabilities in EPI Breads' cybersecurity measures, making them a target for sophisticated threat actors.

About Play Ransomware Group

Active since June 2022, the Play ransomware group has been responsible for numerous high-profile attacks across various industries, including IT, transportation, construction, and critical infrastructure. The group employs various methods to gain entry into networks, such as exploiting RDP servers, FortiOS vulnerabilities, and Microsoft Exchange vulnerabilities. They use tools like Mimikatz for privilege escalation and custom tools to enumerate users and computers on compromised networks. Play ransomware is known for its minimalistic ransom notes, directing victims to contact the threat actors via email.

Penetration Methods

The Play ransomware group could have penetrated EPI Breads' systems through several vectors, including exploiting vulnerabilities in RDP servers or Microsoft Exchange, using valid accounts, or leveraging custom tools to disable antimalware solutions. The group's sophisticated tactics and techniques make them a formidable threat to organizations with insufficient cybersecurity measures.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.