Antwerp train station

The Play ransomware operation has claimed responsibility for a recent cyberattack on the Belgium city of Antwerp.

Last week, Digipolis, the IT company responsible for managing Antwerp's IT systems, suffered a ransomware attack that disrupted the city's IT, email, and phone services.

Local media reported that many of the city's Windows applications were no longer available, and City council member Alexandra d'Archambeau publicly tweeted that email was not available.

Wiz
Tweet from Antwerp councilor member Alexandra d’Archambeau
Tweet from Antwerp councilor member Alexandra d’Archambeau

The disruption continues with the city warning that almost all services are unavailable or significantly delayed, including job applications, use of libraries, and new agreements with the city.

Play ransomware claims attack

While local media had confirmed that ransomware was behind the attack, it was unclear what operation attacked the city.

Over the weekend, Emsisoft threat analyst Brett Callow noticed that the Play ransomware operation started listing Antwerp as one of its victims.

This Antwerp entry on the data leak site claims that 557 GB of data was stolen during the attack, including personal information, passports, IDs, and financial documents.

Antwerp entry on the Play data leak site
Antwerp entry on the Play data leak site
Source: BleepingComputer

However, data from the city has yet to be leaked, with the threat actors indicating they will begin publishing data in a week unless a ransom is paid.

Play ransomware is a relatively new operation, launched in June 2022 when victims began describing their attacks in the BleepingComputer forums.

Soon after, the ransomware gang targeted Argentina's Judiciary of Córdoba, in what was their most significant known attack.

Since then, the ransomware operation has slowly grown, amassing a steady stream of victims worldwide.

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.

Related Articles:

Marquis: Ransomware gang stole data of 672K people in cyberattack

Mississippi medical center reopens clinics hit by ransomware attack

Mississippi medical center closes all clinics after ransomware attack

Romania's oil pipeline operator Conpet confirms data stolen in attack

Microsoft links Medusa ransomware affiliate to zero-day attacks