On March 15, 2026, the prolific Play ransomware group claimed to have successfully breached Executive Aviation, a U.S.-based company in the aviation industry. The group added the company to its data leak site, employing a classic double-extortion tactic by threatening to release stolen sensitive data if their ransom demands are not met. The incident underscores the persistent and growing threat that ransomware poses to critical infrastructure sectors, including aviation.
The Play group, active since at least June 2022, is known for its sophisticated attack methods and has been the subject of a CISA advisory. Their tactics often involve exploiting vulnerabilities in public-facing network devices and using custom tools to bypass security measures. This attack on Executive Aviation is a stark reminder for all organizations, particularly those in critical sectors, to prioritize cybersecurity hygiene and incident response preparedness.
While specifics of the Executive Aviation breach are not public, the general Tactics, Techniques, and Procedures (TTPs) of the Play ransomware group are well-documented by CISA and security researchers.
net.exe and wevtutil.exe for discovery and defense evasion. They also use more advanced tools like AdFind to query Active Directory and map out the network..play extension. A ransom note, typically named ReadMe.txt, is dropped in encrypted directories, instructing the victim on how to contact the attackers.Defenders should hunt for common Play TTPs:
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
command_line_pattern |
wevtutil.exe cl "System" |
Play actors use the Windows Event Utility to clear System, Security, and Application logs to cover their tracks. | Windows Event ID 4688, EDR logs | High |
file_name |
AdFind.exe |
The presence and execution of this legitimate Active Directory query tool is a common indicator of reconnaissance by ransomware groups. | EDR, FIM logs | High |
file_name |
*.play |
The appearance of files with the .play extension is a definitive sign of successful encryption by the Play ransomware. |
FIM, EDR | High |
url_pattern |
*/negotiations |
Play ransomware's Tor-based negotiation site often uses this URL structure. | Proxy logs (if Tor is not blocked) | Medium |
AdFind.exe, PsExec.exe, and wevtutil.exe. While these can have legitimate uses, their execution by non-admin users or in unusual contexts should trigger an alert.Prioritize patching of internet-facing VPNs and other remote access solutions to close common initial access vectors.
Enforce MFA on all remote access services to prevent credential-based intrusions.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats