
The Play ransomware group has expanded its operations to target VMware ESXi environments, utilizing a new Linux variant that demonstrates connections to the previously active Puma group. Recent research by Trend Micro indicates that a series of attacks have been directed at VMware ESXi servers, employing double-extortion tactics that have become a hallmark of the Play ransomware group. This development marks a significant escalation in the threat landscape for organizations relying on VMware ESXi virtualization technology.


New Exploit Variation Against D-Link NAS Devices (CVE-2024-3273), (Tue, Jul 23rd) https://t.co/c0Y9Fvdplg
A string of attacks on @VMware ESXi servers were launched by the Play #ransomware group, best known for its double-extortion tactics, according to research from @TrendMicro. #cybersecurity #infosecurity #ITsecurity https://t.co/WO8uLBSjqh
New Play ransomware Linux version targets VMware ESXi VMs https://t.co/EXa45HisXf