Fresh Pinball: From the Future!
Let’s travel to the future and talk pinball „cheating“ devices!
Enjoy this bonus episode prior to the season 5 premiere.
Let’s travel to the future and talk pinball „cheating“ devices!
Enjoy this bonus episode prior to the season 5 premiere.
The Magic of Harry Potter Jersey Jack Brings Beloved Franchise Into the Pinball World With some incredible licenses already under their belts, the team at Jersey Jack Pinball has outdone themselves this time. It’s a game that company founder Jack Guarnieri has had in mind for more than a decade. “There’s a lot of great […]
Guns N’ Roses frontman Axl Rose signs the Jersey Jack Pinball machine that was auctioned off. A Jersey Jack Pinball Guns N’ Roses pinball machine was among the items donated to an auction that raised nearly $200 million for charity. It was part of “Back to the Beginning,” the final concert for Ozzy Osbourne and Black Sabbath. The […]
Let’s chat about the Stern SAM system era from 2006 through 2014.
World Poker Tour through The Walking Dead and everything in between.
Want to import games? Prepare yourself to negotiate when the time comes to get your game out of pinball jail! Sometime quarantine just isn’t enough.
The season 4 finale!
Saturday 21st June, 2025, saw the first Pinball Heaven Open House, held at the company’s headquarters in the Lancashire town of Tarleton. Tarleton Courtyard, home of Pinball Heaven First established in 1994 as a pinball restoration company, Pinball Heaven is now the exclusive UK distributor for Jersey Jack Pinball, Spooky Pinball, Dutch Pinball, Hexa Pinball […]
The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this advisory in response to ransomware actors leveraging unpatched instances of a vulnerability in SimpleHelp Remote Monitoring and Management (RMM) to compromise customers of a utility billing software provider. This incident reflects a broader pattern of ransomware actors targeting organizations through unpatched versions of SimpleHelp RMM since January 2025.
SimpleHelp versions 5.5.7 and earlier contain several vulnerabilities, including CVE-2024-57727—a path traversal vulnerability.1 Ransomware actors likely leveraged CVE-2024-57727 to access downstream customers’ unpatched SimpleHelp RMM for disruption of services in double extortion compromises.1
CISA added CVE-2024-57727 to its Known Exploited Vulnerabilities (KEV) Catalog on Feb. 13, 2025.
CISA urges software vendors, downstream customers, and end users to immediately implement the Mitigations listed in this advisory based on confirmed compromise or risk of compromise.
Download the PDF version of this report:
CISA recommends organizations implement the mitigations below to respond to emerging ransomware activity exploiting SimpleHelp software. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections. These mitigations apply to all critical infrastructure organizations.
If SimpleHelp is embedded or bundled in vendor-owned software or if a third-party service provider leverages SimpleHelp on a downstream customer’s network, then identify the SimpleHelp server version at the top of the file <file_path>/SimpleHelp/configuration/serverconfig.xml. If version 5.5.7 or prior is found or has been used since January 2025, third-party vendors should:
Determine if the system is running an unpatched version of SimpleHelp RMM either directly or embedded in third-party software.
Determine if an endpoint is running the remote access (RAS) service by checking the following paths depending on the specific environment:
%APPDATA%JWrapper-Remote Access/opt/JWrapper-Remote Access/Library/Application Support/JWrapper-Remote AccessIf RAS installation is present and running, open the serviceconfig.xml file in <file_path>/JWrapper-Remote Access/JWAppsSharedConfig/ to determine if the registered service is vulnerable. The lines starting with <ConnectTo indicate the server addresses where the service is registered.
Determine the version of any SimpleHelp server by performing an HTTP query against it. Add /allversions (e.g., https://simple-help.com/allversions) to query the URL for the version page. This page will list the running version.
If an unpatched SimpleHelp version 5.5.7 or earlier is confirmed on a system, organizations should conduct threat hunting actions for evidence of compromise and continuously monitor for unusual inbound and outbound traffic from the SimpleHelp server. Note: This is not an exhaustive list of indicators of compromise.
aaa.exe, bbb.exe, etc.) with a creation time after January 2025. Additionally, perform host and network vulnerability security scans via reputable scanning services to verify malware is not on the system.If your organization is unable to immediately identify and patch vulnerable versions of SimpleHelp, apply appropriate workarounds. In this circumstance, CISA recommends using other vendor-provided mitigations when available. These non-patching workarounds should not be considered permanent fixes and organizations should apply the appropriate patch as soon as it is made available.
If a system has been encrypted by ransomware:
CISA urges you to promptly report ransomware incidents to a local FBI Field Office, FBI’s Internet Crime Compliant Center (IC3), and CISA via CISA’s 24/7 Operations Center (report@cisa.gov or 1-844-Say-CISA).
To reduce opportunities for intrusion and to strengthen response to ransomware activity, CISA recommends customers of vendors and managed service providers (MSPs) implement the following best practices:
Your organization has no obligation to respond or provide information back to FBI in response to this advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.
FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.
Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.
CISA and FBI do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (report@cisa.gov) or by calling 1-844-Say-CISA (1-844-729-2472).
SimpleHelp users or vendors can contact support@simple-help.com for assistance with queries or concerns.
The information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by CISA.
June 12, 2025: Initial version.
1. Anthony Bradshaw, et. al., “DragonForce Actors Target SimpleHelp Vulnerabilities to Attack MSP, Customers,” Sophos News, May 27, 2025, https://news.sophos.com/en-us/2025/05/27/dragonforce-actors-target-simplehelp-vulnerabilities-to-attack-msp-customers/.
2. For instructions for upgrading to the latest version of SimpleHelp, see SimpleHelp’s security vulnerability advisory.
3. To determine possibility of compromise and next steps, see SimpleHelp’s guidance.
4. For instructions for upgrading to the latest version of SimpleHelp, see SimpleHelp’s security vulnerability advisory.
A very special BONUS EPISODE.
Let’s talk to Micah Dorward from Finney’s Arcade and Parlor. Why in the world would you open an arcade in 2025?!
Additionally, we chat briefly about the Harry Potter CE at Finney’s.
Harry Potter Pinball, from the team over at Jersey Jack, officially debuted on June 5. And for the first time ever on a pinball machine is the “Jersey Jack Pinball Game Changer,” a patent-pending option allowing players to choose their own difficulty level for play, the company’s Jack Guarnieri said. “Using an included JJP key […]
CHICAGO, June 5, 2025 /PRNewswire/ — Jersey Jack Pinball in partnership with Warner Bros. Discovery Global Consumer Products (WBDGCP), is proud to unveil its most eagerly awaited release to date: Harry Potter™ Pinball — a rare and mystical collector’s item that brings the beloved world of Harry Potter to life like never before. Crafted with extraordinary detail […]
Fancy yourself as a bit of a pinball wizard? In which case, you’ll love these snazzy new Harry Potter-themed pinball machines, boasting brilliant wizarding world designs. How cool are these? These collectors‘ edition pinball machines are absolutely covered in wizarding world goodness, courtesy of Jersey Jack Pinball. Flip your way to success with these […]