On March 15, 2026, the prolific Play ransomware group claimed to have successfully breached Executive Aviation, a U.S.-based company in the aviation industry. The group added the company to its data leak site, employing a classic double-extortion tactic by threatening to release stolen sensitive data if their ransom demands are not met. The incident underscores the persistent and growing threat that ransomware poses to critical infrastructure sectors, including aviation.
The Play group, active since at least June 2022, is known for its sophisticated attack methods and has been the subject of a CISA advisory. Their tactics often involve exploiting vulnerabilities in public-facing network devices and using custom tools to bypass security measures. This attack on Executive Aviation is a stark reminder for all organizations, particularly those in critical sectors, to prioritize cybersecurity hygiene and incident response preparedness.
While specifics of the Executive Aviation breach are not public, the general Tactics, Techniques, and Procedures (TTPs) of the Play ransomware group are well-documented by CISA and security researchers.
net.exe and wevtutil.exe for discovery and defense evasion. They also use more advanced tools like AdFind to query Active Directory and map out the network..play extension. A ransom note, typically named ReadMe.txt, is dropped in encrypted directories, instructing the victim on how to contact the attackers.Defenders should hunt for common Play TTPs:
command_line_patternwevtutil.exe cl "System"file_nameAdFind.exefile_name*.play.play extension is a definitive sign of successful encryption by the Play ransomware.url_pattern*/negotiationsAdFind.exe, PsExec.exe, and wevtutil.exe. While these can have legitimate uses, their execution by non-admin users or in unusual contexts should trigger an alert.Prioritize patching of internet-facing VPNs and other remote access solutions to close common initial access vectors.
Enforce MFA on all remote access services to prevent credential-based intrusions.
The Play ransomware group posts Executive Aviation on its data leak site.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.