Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization

Posted on May 7, 2025May 9, 2025 By CWS No Comments on Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization

Menace actors with hyperlinks to the Play ransomware household exploited a just lately patched safety flaw in Microsoft Home windows as a zero-day as a part of an assault concentrating on an unnamed group in america.
The assault, per the Symantec Menace Hunter Staff, a part of Broadcom, leveraged CVE-2025-29824, a privilege escalation flaw within the Frequent Log File System (CLFS) driver. It was patched by Microsoft final month.
Play, additionally known as Balloonfly and PlayCrypt, is understood for its double extortion techniques, whereby delicate knowledge is exfiltrated previous to encryption in trade for a ransom. It is lively since not less than mid-2022.
Within the exercise noticed by Symantec, the risk actors are mentioned to have doubtless leveraged a public-facing Cisco Adaptive Safety Equipment (ASA) as an entry level, benefiting from an as-yet-undetermined methodology to maneuver to a different Home windows machine on the goal community.
The assault is notable for using Grixba, a bespoke data stealer beforehand attributed to Play and an exploit for CVE-2025-29824 that is dropped within the Music folder, giving it names that masquerade as Palo Alto Networks software program (e.g., “paloaltoconfig.exe” and “paloaltoconfig.dll”).
The risk actors have additionally been noticed working instructions to assemble details about all of the out there machines within the victims’ Energetic Listing and save the outcomes to a CSV file.
“Through the execution of the exploit, two information are created within the path C:ProgramDataSkyPDF,” Symantec defined. “The primary file, PDUDrv.blf, is a Frequent Log File System base log file and is an artifact created throughout exploitation.”
“The second file, clssrv.inf, is a DLL that’s injected into the winlogon.exe course of. This DLL has the power to drop two further batch information.”
One of many batch information, known as “servtask.bat,” is used to escalate privileges, dump the SAM, SYSTEM, and SECURITY Registry hives, create a brand new consumer named “LocalSvc,” and it to the Administrator group. The opposite batch file, “cmdpostfix.bat,” is used to scrub up traces of exploitation.
Symantec mentioned that no ransomware payload was deployed within the intrusion. The findings present that exploits for CVE-2025-29824 could have been out there to a number of risk actors earlier than it was mounted by Microsoft.
It is value noting that the character of exploitation detailed by the cybersecurity firm doesn’t overlap with one other exercise cluster dubbed Storm-2460 that Microsoft disclosed as having weaponized the flaw in a restricted set of assaults to ship a trojan dubbed PipeMagic.

The exploitation of CVE-2025-29824 additionally factors to the pattern of ransomware actors utilizing zero-days to infiltrate targets. Final yr, Symantec divulged that the Black Basta group could have taken benefit of CVE-2024-26169, a privilege escalation within the Home windows Error Reporting Service, as a zero-day.
New “Convey Your Personal Installer” EDR Bypass Utilized in Babuk Ransomware Assault
The disclosure comes as Aon’s Stroz Friedberg Incident Response Companies detailed a neighborhood bypass method known as Convey Your Personal Installer that is being exploited by risk actors to disable endpoint safety software program and deploy the Babuk ransomware.
The assault, per the corporate, focused SentinelOne’s Endpoint Detection and Response (EDR) system by exploiting a flaw throughout the improve/downgrade strategy of the SentinelOne agent after having gained native administrative entry on a publicly-accessible server.

“Convey Your Personal Installer is a way which can be utilized by risk actors to bypass EDR safety on a bunch by way of timed termination of the agent replace course of when inadequately configured,” Aon researchers John Ailes and Tim Mashni mentioned.
The method is noteworthy as a result of it doesn’t depend on weak drivers or different instruments to disarm safety software program. Fairly it exploits a time window within the agent improve course of to terminate working EDR brokers, leaving units unprotected.
Particularly, it abuses the truth that putting in a distinct model of the software program utilizing an MSI file causes it to terminate already working Home windows processes earlier than the replace is carried out.
The Convey Your Personal Installer assault basically includes working a legit installer and forcefully terminating the set up course of by issuing a “taskkill” command after it shuts down the working companies.
“As a result of the outdated model of SentinelOne processes have been terminated in the course of the improve, and the brand new processes have been interrupted earlier than spawning, the ultimate outcome was a system with out SentinelOne safety,” Aon researchers mentioned.
SentinelOne, which mentioned the method might be utilized in opposition to different endpoint safety merchandise, has since rolled out updates to its Native Improve Authorization characteristic with a view to mitigate such bypasses from taking place once more. This consists of enabling it by default for all new prospects.

The disclosure comes as Cisco revealed {that a} ransomware household referred to as Crytox has employed HRSword as a part of their assault chain to show off endpoint safety protections.
HRSword has been beforehand noticed in assaults delivering BabyLockerKZ and Phobos ransomware strains, in addition to these designed to terminate AhnLab’s safety options in South Korea.
New Ransomware Tendencies
Ransomware assaults have additionally more and more skilled their sights on area controllers to breach organizations, permitting risk actors to acquire entry to privileged accounts and weaponize the centralized community entry to encrypt a whole lot or 1000’s of programs inside minutes.
“Greater than 78% of human-operated cyberattacks, risk actors efficiently breach a site controller,” Microsoft revealed final month.
“Moreover, in additional than 35% of instances, the first spreader gadget — the system chargeable for distributing ransomware at scale — is a site controller, highlighting its essential position in enabling widespread encryption and operational disruption.”

Different ransomware assaults detected in latest months have leveraged a brand new Ransomware-as-a-Service (RaaS) referred to as PlayBoy Locker, which offers comparatively unskilled cybercriminals with a complete toolkit comprising ransomware payloads, administration dashboards, and help companies.
“The PlayBoy Locker RaaS platform presents associates quite a few choices for constructing ransomware binaries that focus on Home windows, NAS, and ESXi programs, enabling tailor-made configurations to swimsuit totally different operational necessities,” Cybereason mentioned. “PlayBoy Locker RaaS operators promote common updates, anti-detection options, and even buyer help for associates.”
The developments have additionally coincided with the launch of a ransomware cartel by DragonForce, an e-crime group that has claimed management of RansomHub, a RaaS scheme that abruptly ceased operations on the finish of March 2025.

The white-label branding service is designed to permit associates to disguise the DragonForce ransomware as a distinct pressure for an extra charge. The risk actor claims to take a 20% share of profitable ransomware payouts, permitting the associates to maintain the remaining 80%.
DragonForce emerged in August 2023, positioning itself as a pro-Palestine hacktivist operation earlier than evolving right into a full-fledged ransomware operation. In latest weeks, the RaaS syndicate has attracted consideration for its concentrating on of U.Okay. retailers like Harrods, Marks and Spencer, and the Co-Op.
“This transfer, together with DragonForce’s push to model itself as a ‘ransomware cartel,’ illustrates the group’s want to boost its profile within the crimeware panorama by enabling an ecosystem,” SentinelOne mentioned. “Underneath this mannequin, DragonForce offers the infrastructure, malware, and ongoing help companies whereas associates run campaigns beneath their very own branding.”
In keeping with a report from BBC Information, the assaults aimed on the U.Okay. retail sector are believed to have been orchestrated by a infamous risk group and a RansomHub affiliate referred to as Scattered Spider (aka Octo Tempest or UNC3944).

“It’s believable that risk actors together with UNC3944 view retail organizations as enticing targets, on condition that they sometimes possess massive portions of personally identifiable data (PII) and monetary knowledge,” Google-owned Mandiant mentioned.
“Additional, these firms could also be extra prone to pay a ransom demand if a ransomware assault impacts their skill to course of monetary transactions.”
Ransomware assaults have witnessed a rise of 25% in 2024, with the variety of ransomware group leak websites rising by 53%. The fragmentation, per Bitsight, is the arrival of smaller, extra agile gangs which can be placing mid-sized organizations that won’t at all times have the assets to sort out such threats.
“The proliferation of ransomware teams signifies that they’re growing quicker than legislation enforcement can shut them down, and their deal with smaller organizations signifies that anybody could also be a goal,” safety researcher Dov Lerner mentioned.

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Breach, CVE202529824, Exploited, Organization, Play, Ransomware, U.S, Windows, ZeroDay

Post navigation

Previous Post: AppSignal Raises $22 Million for Application Monitoring Solution
Next Post: A Technical Gap Analysis of Last-Mile Protection

Related Posts

MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks The Hacker News
CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users The Hacker News
OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws The Hacker News
BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan The Hacker News
Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business The Hacker News
Entra ID Data Protection: Essential or Overkill? The Hacker News

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Telecommunications Companies in Spain Experiencing Downtime
  • CloudSEK Raises $19 Million for Threat Intelligence Platform
  • O2 Service Vulnerability Exposed User Location
  • Madhu Gottumukkala Officially Appointed CISA Deputy Director
  • Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • Telecommunications Companies in Spain Experiencing Downtime
  • CloudSEK Raises $19 Million for Threat Intelligence Platform
  • O2 Service Vulnerability Exposed User Location
  • Madhu Gottumukkala Officially Appointed CISA Deputy Director
  • Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News