Ransomware Attack Disrupts Plaisted Companies Operations

Incident Date:

September 18, 2024

World map

Overview

Title

Ransomware Attack Disrupts Plaisted Companies Operations

Victim

Plaisted Companies

Attacker

Play

Location

Elk River, USA

Minnesota, USA

First Reported

September 18, 2024

Ransomware Attack on Plaisted Companies by PLAY Ransomware Group

Plaisted Companies, a well-established supplier of sand, gravel, and other aggregate materials based in Elk River, Minnesota, has recently fallen victim to a ransomware attack orchestrated by the PLAY ransomware group. The attack has raised significant concerns within the construction and landscaping sectors, given the company's prominent role and extensive client base.

About Plaisted Companies

Founded in 1990 by Todd Plaisted, Plaisted Companies has grown to become a key player in the construction and landscaping industries. The company specializes in providing a wide range of aggregate materials, including sand, gravel, engineered soils, and horticultural products. Their offerings cater to both residential and commercial clients, with a strong emphasis on quality and customer service. The company operates with an estimated annual revenue of approximately $18 million and is known for its innovative solutions, such as the Accublender™ system introduced in 1995.

Attack Overview

The PLAY ransomware group has claimed responsibility for the attack on Plaisted Companies, threatening to publish the compromised data on September 24. The stolen data reportedly includes private and personal confidential information, client documents, budget details, payroll records, accounting information, contracts, tax documents, identification details, and financial information. This breach has the potential to cause significant disruption to the company's operations and damage its reputation.

About PLAY Ransomware Group

The PLAY ransomware group, also known as PlayCrypt, has been active since June 2022. Initially targeting Latin America, the group has expanded its operations to North America, South America, and Europe. PLAY ransomware is known for targeting a diverse range of industries, including IT, transportation, construction, materials, government entities, and critical infrastructure. The group employs various methods to gain entry into networks, such as exploiting RDP servers, FortiOS vulnerabilities, and Microsoft Exchange vulnerabilities.

Penetration Methods

PLAY ransomware uses a combination of scheduled tasks, PsExec, and Group Policy Objects (GPOs) to execute its code and maintain persistence on compromised systems. The group also utilizes tools like Mimikatz for privilege escalation and employs defense evasion techniques to disable antimalware and monitoring solutions. Custom tools are used to enumerate users and computers on the network and copy files from the Volume Shadow Copy Service (VSS).

Vulnerabilities and Impact

Plaisted Companies' extensive digital footprint and reliance on networked systems for operations and customer service make it a prime target for ransomware attacks. The company's commitment to quality and innovation, while beneficial, also means that any disruption can have far-reaching consequences. The attack by the PLAY ransomware group underscores the importance of stringent cybersecurity measures, especially for companies in critical sectors like construction and landscaping.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.