Ransomware Attack on Kinter by Play Group Compromises Sensitive Data

Incident Date:

June 12, 2024

World map

Overview

Title

Ransomware Attack on Kinter by Play Group Compromises Sensitive Data

Victim

Kinter

Attacker

Play

Location

Waukegan, USA

Illinois, USA

First Reported

June 12, 2024

Ransomware Attack on Kinter by Play Group

Overview of Kinter

Kinter, also known as K International, Inc., is a prominent distributor of retail display solutions headquartered in Waukegan, Illinois. The company operates an 84,000 square foot warehouse and employs approximately 150 people. Kinter specializes in designing, manufacturing, and distributing a variety of products aimed at enhancing the visual appeal and organizational efficiency of retail spaces. Their offerings include display hooks, sign holders, shelf management systems, and other point-of-purchase display accessories. Kinter's commitment to innovation and customer satisfaction has made them a trusted partner for top retailers in the United States.

Details of the Attack

The ransomware group Play has claimed responsibility for a cyberattack on Kinter. The attack, which was announced on Play's dark web leak site, resulted in the compromise of private and personal confidential data, including client documents, budget, payroll, accounting, contracts, taxes, IDs, and financial information. The breach has raised significant concerns about the security measures in place at Kinter and the potential impact on their operations and clients.

About the Play Ransomware Group

Play ransomware is a notable actor in the cybercrime landscape, known for targeting Linux systems. The group is associated with the Babuk code and has evolved to target ESXi lockers. Play ransomware is operated by Ransom House, which initially focused on data theft but has since adopted cryptographic lockers. The group is known for its sophisticated tactics, including the use of Sosemanuk for encryption and a unique verbose ransom note that provides explicit instructions to victims.

Penetration and Vulnerabilities

Play ransomware actors have been observed using various hack tools and utilities to gain initial access to target systems. These tools include AnyDesk, NetCat, and encoded PowerShell Empire scripts. The group's ability to exploit vulnerabilities in Linux environments and their sophisticated approach to victim communication distinguish them from other ransomware actors. Kinter's reliance on digital systems for managing their extensive product offerings and client data may have made them an attractive target for Play ransomware.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.