Joe Swartz Electric Hit by Play Ransomware Compromising Data

Incident Date:

September 10, 2024

World map

Overview

Title

Joe Swartz Electric Hit by Play Ransomware Compromising Data

Victim

Joe Swartz Electric

Attacker

Play

Location

Houston, USA

Texas, USA

First Reported

September 10, 2024

Ransomware Attack on Joe Swartz Electric by Play Ransomware Group

Joe Swartz Electric, a well-established electrical service provider in Houston, Texas, has recently fallen victim to a ransomware attack orchestrated by the Play ransomware group. This breach has compromised a wide array of sensitive information, including private and personal confidential data, client documents, budgetary details, payroll records, accounting files, contracts, tax information, identification documents, and financial data.

About Joe Swartz Electric

Founded in 1960, Joe Swartz Electric specializes in residential electrical services, offering a comprehensive range of services such as estimating and load analysis, one-line service diagrams, electrical wiring, voice and data communication systems, security systems, structured wiring, and central vacuum systems. The company has wired over 100,000 homes in the Greater Houston area, emphasizing quality and customer satisfaction.

Company Vulnerabilities

Despite its strong reputation and extensive experience, Joe Swartz Electric's focus on residential new construction projects and its medium-sized operational scale may have made it an attractive target for threat actors. The company's reliance on digital systems for managing client data, payroll, and other sensitive information could have presented vulnerabilities that the Play ransomware group exploited.

Attack Overview

The Play ransomware group, also known as PlayCrypt, has been active since June 2022 and has targeted various industries, including IT, transportation, construction, and government entities. The group uses multiple methods to gain entry into networks, such as exploiting RDP servers, FortiOS vulnerabilities, and Microsoft Exchange vulnerabilities. They execute their ransomware using scheduled tasks, PsExec, and Group Policy Objects (GPOs).

Distinguishing Features of Play Ransomware Group

Play ransomware is known for its minimalistic ransom notes, which direct victims to contact the threat actors via email without an initial ransom demand. The group employs custom tools to enumerate users and computers on compromised networks and uses tools like Mimikatz for privilege escalation. They also disable antimalware and monitoring solutions to evade detection.

Penetration of Joe Swartz Electric's Systems

While the exact method of penetration in the Joe Swartz Electric attack is not publicly detailed, it is likely that the Play ransomware group exploited vulnerabilities in the company's network infrastructure, possibly through compromised VPN accounts or unpatched software vulnerabilities. The extensive data compromised suggests that the attackers had significant access to the company's internal systems.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.