Daily Dark Web
  • Home
  • Cyber Attacks
  • DarkWeb News
  • Data Breaches
  • Vulnerability
  • Ransomware News
  • Unauthorized Accesses
  • Contact
No Result
View All Result
  • Home
  • Cyber Attacks
  • DarkWeb News
  • Data Breaches
  • Vulnerability
  • Ransomware News
  • Unauthorized Accesses
  • Contact
No Result
View All Result
Daily Dark Web
No Result
View All Result
Home Ransomware News

Unit42 Detected Possible Collaboration Between North Korea and Play Ransomware

March 25, 2025
Reading Time: 2 mins read
Unit42 Detected Possible Collaboration Between North Korea and Play Ransomware

Play ransomware, first detected in mid-2022, is linked to a threat group identified as “Fiddling Scorpius,” which is suspected to manage both the development and execution of attacks using the ransomware. Contrary to speculation that Fiddling Scorpius may have adopted a ransomware-as-a-service (RaaS) model, the group asserted on its Play ransomware leak site that it operates independently, without providing RaaS services.

In September 2024, Unit 42 responded to a Play ransomware incident impacting one of their clients. Through Unit 42’s investigation, it was confirmed with high confidence that Jumpy Pisces, a North Korean state-sponsored threat group, gained initial access to the network in May 2024 via a compromised user account. This entry point enabled Jumpy Pisces to perform lateral movement and establish persistence, employing the open-source tool Sliver and their custom malware, DTrack. Both tools were distributed to multiple hosts through the Server Message Block (SMB) protocol, maintaining communication with their command-and-control (C2) servers up until the ransomware deployment in early September.

Analysis of Potential Collaboration
Based on Unit 42’s observations, moderate confidence is placed in the likelihood of collaboration between Jumpy Pisces and Play ransomware. The compromised account initially accessed by Jumpy Pisces was later leveraged for Windows access token abuse and SYSTEM privilege escalation through PsExec, ultimately leading to the uninstallation of EDR sensors and ransomware deployment. Notably, Sliver C2 communication continued until the day before the ransomware attack, and the associated IP address went offline immediately after the ransomware deployment, supporting a potential link.

While it is uncertain if Jumpy Pisces acted as an affiliate or simply as an initial access broker (IAB) selling network access to the ransomware operators, this event highlights a notable collaboration between a state-sponsored North Korean group and an underground ransomware network. This alignment could suggest an emerging trend of North Korean groups joining global ransomware campaigns, potentially leading to broader, more destructive attacks on a global scale.

Full research.

Tags: collaborationNorth KoreaPlayRansomwareRaaSransomwarestateState sponsored
ShareTweet

Related Posts

INC Ransom Allegedly Adds 8 More International Firms to Victim List
Ransomware News

INC Ransom Allegedly Adds 8 More International Firms to Victim List

July 17, 2025
DEVMAN Ransomware Group Allegedly Breaches Thai Ministry of Labour
Ransomware News

DEVMAN Ransomware Group Allegedly Breaches Thai Ministry of Labour

July 17, 2025
Qilin Ransomware Allegedly Targets 11 International Organizations
Ransomware News

Qilin Ransomware Allegedly Breaches Spanish Consulting Firm Joseantonio Rodriguez and US Manufacturing Company Specialty Components

July 17, 2025
Qilin Ransomware Allegedly Targets 11 International Organizations
Ransomware News

Qilin Ransomware Group Allegedly Breaches Five U.S. Entities – Halvorsen Family Law, WH Rogers Sheet Metal, City of Green River, Paul Wilkinson Law Firm, and ProActive Solutions USA

July 16, 2025
CARSTAR Business Group Allegedly Hit by Sarcoma Ransomware
Ransomware News

CARSTAR Business Group Allegedly Hit by Sarcoma Ransomware

July 14, 2025
Qilin Ransomware Allegedly Targets 11 International Organizations
Ransomware News

Knight Knox Manchester Property Investment Firm Allegedly Targeted by Qilin Ransomware

July 4, 2025
Next Post
Interbank Confirms Data Breach

Interbank Confirms Data Breach

RENIEC Allegedly Breached 37M Citizen Data Leaked

RENIEC Allegedly Breached 37M Citizen Data Leaked

Recommended Stories

Alleged Data Breach at CentraCare Exposes Sensitive Patient Information

Alleged Data Breach at CentraCare Exposes Sensitive Patient Information

December 4, 2024
Threat Actor Claims to Sell WordPress Admin Authentication Bypass Exploit for $50,000

Threat Actor Claims to Sell WordPress Admin Authentication Bypass Exploit for $50,000

May 26, 2024
Massive New Year Database Dump Raises Global Privacy Concerns

Massive New Year Database Dump Raises Global Privacy Concerns

January 2, 2025

Popular Stories

  • Threat Actor Claims Sale of Dell Database Containing 49 Million Customer Records

    Threat Actor Claims Sale of Dell Database Containing 49 Million Customer Records

    0 shares
    Share 0 Tweet 0
  • Threat Actor Claims to Have Leaked Database Containing Personal Information of 5 Million Salvadoran Citizens

    0 shares
    Share 0 Tweet 0
  • Deloitte Allegedly Suffers Major Data Breach – Source Code and GitHub Credentials Reportedly Leaked

    0 shares
    Share 0 Tweet 0
  • Threat Actor Claims Sale of State Grid Corporation of China (SGCC) Data, World’s Largest Utility Company

    0 shares
    Share 0 Tweet 0
  • New ATM Malware Threatens European Banking Security

    0 shares
    Share 0 Tweet 0
Daily Dark Web

Daily Dark Web© 2024

No Result
View All Result
  • Contact
  • Home
  • Newsletter
  • Privacy Policy

Daily Dark Web© 2024

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?