You have 0 free articles left this month.
Register for a free account to access unlimited free content.
Powered by MOMENTUM MEDIA
lawyers weekly logo

Powered by MOMENTUMMEDIA

For breaking news and daily updates, subscribe to our newsletter.
Advertisement

Major supplier of military and commercial aircraft allegedly hit by Play ransomware

Threat actors have claimed a ransomware attack on a major supplier for the US Navy, Northrop Grumman, Boeing and more, having allegedly stolen company data.

Major supplier of military and commercial aircraft allegedly hit by Play ransomware
expand image

Jamco Aerospace is a New York-based engineering and fabrication firm that specialises in crafting components for aerospace and aircraft manufacturers, including aircraft builders used by the US and other governments.

The company was listed on the ransomware site of Play Ransomware on Wednesday (6 August) last week, with a ransom payment deadline of Sunday, 10 August.

The group claims to have exfiltrated “private and personal confidential data, clients documents, budget, payroll, IDs, taxes, finance information, etc”. However, the group has not specified how much data it claims to have stolen.

 
 

With the deadline now having been reached, the group said it has published only some of the data and that it will publish the rest if Jamco Aerospace does not reach out.

At this stage, Jamco Aerospace has yet to acknowledge the cyber attack publicly. Cyber Daily has also not been able to verify the authenticity of the data posted by Play ransomware.

According to cyber security firm Rapid7’s quarterly report, Play ransomware has cemented itself as one of the most notorious ransomware gangs in current operation, listing the fourth most number of victims with 125, almost double the next largest group.

In total, the group has impacted roughly 900 organisations globally as of May 2025. In an updated joint advisory published by the US Critical Infrastructure and Security Agency (CISA) and FBI, alongside the Australian Signals Directorate’s Australian Cyber Security Centre (ACSC), the group makes initial contact via both telephone and email.

“Each victim receives a unique @gmx.de or @web[.]de email for communications,” a 4 June update within the advisory said.

“A portion of victims are contacted via telephone and are threatened with the release of the stolen data and encouraged to pay the ransom.”

Play has also been observed, alongside other actors and access brokers, taking advantage of a vulnerability in the remote management tool SimpleHelp. CVE-2024-57727 was disclosed in January 2025 and has allowed many actors to achieve remote code execution across multiple US entities.

The hackers also go through the trouble of recompiling their ransomware binary after every attack in order to provide a unique hash for each network incursion, making it harder for security software to detect any malicious activity. We also know that Play has an ESXi variant of its malware.

“The ESXi variant of Play ransomware invokes shell commands specific to the ESXi environment to conduct tasks, including powering off all running virtual machines (VMs), listing machine names, and setting the welcome message of the ESXi interface to the campaign-specific ransom note,” the advisory said.

“The ransomware binary supports command line arguments; however, if no command line arguments are passed, the malware powers off all VMs and encrypts files related to VMs using randomly generated per-file keys.”

This variant is also recompiled following each attack.

Daniel Croft

Daniel Croft

Born in the heart of Western Sydney, Daniel Croft is a passionate journalist with an understanding for and experience writing in the technology space. Having studied at Macquarie University, he joined Momentum Media in 2022, writing across a number of publications including Australian Aviation, Cyber Security Connect and Defence Connect. Outside of writing, Daniel has a keen interest in music, and spends his time playing in bands around Sydney.
You need to be a member to post comments. Become a member for free today!

newsletter
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.