9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.974 High
EPSS
Percentile
99.9%
attack.mitre.org/tactics/TA0007/
attack.mitre.org/versions/v14/matrices/enterprise/
attack.mitre.org/versions/v14/software/S0002/
attack.mitre.org/versions/v14/software/S0029/
attack.mitre.org/versions/v14/software/S0154/
attack.mitre.org/versions/v14/software/S0552/
attack.mitre.org/versions/v14/tactics/TA0004/
attack.mitre.org/versions/v14/techniques/T1003/
attack.mitre.org/versions/v14/techniques/T1003/
attack.mitre.org/versions/v14/techniques/T1016/
attack.mitre.org/versions/v14/techniques/T1016/
attack.mitre.org/versions/v14/techniques/T1048/
attack.mitre.org/versions/v14/techniques/T1048/
attack.mitre.org/versions/v14/techniques/T1048/
attack.mitre.org/versions/v14/techniques/T1059/
attack.mitre.org/versions/v14/techniques/T1059/001/
attack.mitre.org/versions/v14/techniques/T1070/001/
attack.mitre.org/versions/v14/techniques/T1070/001/
attack.mitre.org/versions/v14/techniques/T1078/
attack.mitre.org/versions/v14/techniques/T1078/
attack.mitre.org/versions/v14/techniques/T1133/
attack.mitre.org/versions/v14/techniques/T1133/
attack.mitre.org/versions/v14/techniques/T1190/
attack.mitre.org/versions/v14/techniques/T1190/
attack.mitre.org/versions/v14/techniques/T1484/001/
attack.mitre.org/versions/v14/techniques/T1484/001/
attack.mitre.org/versions/v14/techniques/T1486/
attack.mitre.org/versions/v14/techniques/T1486/
attack.mitre.org/versions/v14/techniques/T1518/001/
attack.mitre.org/versions/v14/techniques/T1518/001/
attack.mitre.org/versions/v14/techniques/T1552/
attack.mitre.org/versions/v14/techniques/T1552/
attack.mitre.org/versions/v14/techniques/T1560/001/
attack.mitre.org/versions/v14/techniques/T1560/001/
attack.mitre.org/versions/v14/techniques/T1562/001/
attack.mitre.org/versions/v14/techniques/T1562/001/
attack.mitre.org/versions/v14/techniques/T1570/
attack.mitre.org/versions/v14/techniques/T1570/
attack.mitre.org/versions/v14/techniques/T1657/
attack.mitre.org/versions/v14/techniques/T1657/
d3fend.mitre.org/technique/d3f:NetworkTrafficFiltering/
github.com/cisagov/cset/releases/tag/v10.3.0.0
github.com/cisagov/Decider/
nvd.nist.gov/vuln/detail/CVE-2018-13379
nvd.nist.gov/vuln/detail/CVE-2020-12812
nvd.nist.gov/vuln/detail/CVE-2022-41040
nvd.nist.gov/vuln/detail/CVE-2022-41082
pages.nist.gov/800-63-3/
public.govdelivery.com/accounts/USDHSCISA/subscriber/new?topic_id=USDHSCISA_138
symantec-enterprise-blogs.security.com/blogs/threat-intelligence/play-ransomware-volume-shadow-copy
symantec-enterprise-blogs.security.com/blogs/threat-intelligence/play-ransomware-volume-shadow-copy
twitter.com/CISAgov
twitter.com/intent/tweet?text=%23StopRansomware%3A%20Play%20Ransomware+https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-352a
www.cisa.gov/cross-sector-cybersecurity-performance-goals
www.cisa.gov/cyber-hygiene-services
www.cisa.gov/known-exploited-vulnerabilities-catalog
www.cisa.gov/news-events/news/best-practices-mitre-attckr-mapping
www.cisa.gov/resources-tools/resources/cpg-report
www.cisa.gov/resources-tools/resources/cpg-report
www.cisa.gov/resources-tools/resources/cpg-report
www.cisa.gov/resources-tools/resources/cpg-report
www.cisa.gov/resources-tools/resources/cpg-report
www.cisa.gov/resources-tools/resources/cpg-report
www.cisa.gov/resources-tools/resources/cpg-report
www.cisa.gov/resources-tools/resources/cpg-report
www.cisa.gov/resources-tools/resources/cpg-report
www.cisa.gov/resources-tools/resources/cpg-report
www.cisa.gov/resources-tools/resources/cpg-report
www.cisa.gov/resources-tools/resources/cpg-report
www.cisa.gov/resources-tools/resources/cpg-report
www.cisa.gov/resources-tools/resources/cpg-report
www.cisa.gov/resources-tools/resources/cpg-report
www.cisa.gov/resources-tools/resources/secure-by-design
www.cisa.gov/resources-tools/resources/stopransomware-guide
www.cisa.gov/securebydesign
www.cisa.gov/stopransomware
www.cisa.gov/zero-trust-maturity-model
www.cyber.gov.au/
www.cyber.gov.au/protect-yourself/resources-protect-yourself/personal-security-guides/protect-yourself-multi-factor-authentication
www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/network-hardening/implementing-network-segmentation-and-segregation
www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/system-administration/patching-applications-and-operating-systems
www.dhs.gov
www.dhs.gov/foia
www.dhs.gov/performance-financial-reports
www.facebook.com/CISA
www.facebook.com/sharer/sharer.php?u=https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-352a&title=%23StopRansomware%3A%20Play%20Ransomware
www.fbi.gov/contact-us/field-offices
www.ic3.gov/
www.instagram.com/cisagov
www.linkedin.com/company/cybersecurity-and-infrastructure-security-agency
www.linkedin.com/sharing/share-offsite/?url=https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-352a
www.oig.dhs.gov/
www.sentinelone.com/labs/crimeware-trends-ransomware-developers-turn-to-intermittent-encryption-to-evade-detection/
www.sentinelone.com/labs/crimeware-trends-ransomware-developers-turn-to-intermittent-encryption-to-evade-detection/
www.stopransomware.gov/
www.surveymonkey.com/r/CISA-cyber-survey?product=https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-352a
www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-play
www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-play
www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-play
www.usa.gov/
www.whitehouse.gov/
www.youtube.com/@cisagov
mailto:?subject=%23StopRansomware%3A%20Play%20Ransomware&body=www.cisa.gov/news-events/cybersecurity-advisories/aa23-352a
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.974 High
EPSS
Percentile
99.9%