Play Ransomware Exploits Windows Flaw in Global Attacks
Play Ransomware Exploits Windows Flaw in Global Attacks

Play Ransomware Exploits Windows Flaw in Global Attacks

News summary

The Play ransomware gang exploited a high-severity zero-day vulnerability (CVE-2025-29824) in the Windows Common Log File System driver to gain SYSTEM privileges and deploy malware on targeted systems. This flaw enabled attackers to escalate privileges locally, with Microsoft confirming its exploitation in limited attacks against organizations in the U.S. IT and real estate sectors, Venezuela’s financial sector, a Spanish software company, and Saudi Arabia’s retail sector. While some attacks did not result in ransomware deployment, the attackers used a custom infostealer tool called Grixba, associated with the Balloonfly group behind Play ransomware. Microsoft and Symantec linked exploitation activity to both the Play ransomware operators and the threat group Storm-2460, who utilized the PipeMagic backdoor malware in campaigns. The attacks underscore the value ransomware groups place on privilege escalation vulnerabilities for expanding access within compromised networks. Microsoft addressed the flaw in April 2025’s Patch Tuesday, urging organizations to apply the fix to mitigate ongoing threats.

Story Coverage
Bias Distribution
100% Center
Information Sources
68e7fc5e-537b-4887-b796-fbd29c315618
Center 100%
Coverage Details
Total News Sources
1
Left
0
Center
1
Right
0
Unrated
0
Last Updated
23 days ago
Bias Distribution
100% Center
Related News
Daily Index

Negative

22Serious

Neutral

Optimistic

Positive

Ask VT AI
Story Coverage
Subscribe

Stay in the know

Get the latest news, exclusive insights, and curated content delivered straight to your inbox.

Present

Gift Subscriptions

The perfect gift for understanding
news from all angles.

Related News
Recommended News