Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SafePay Ransomware Leverages RDP and VPN for Intruding Into Organizations Network

Posted on July 10, 2025July 11, 2025 By CWS

A brand new ransomware risk has emerged as one of the formidable adversaries within the cybersecurity panorama, demonstrating unprecedented progress and class in its assault methodology.

SafePay ransomware, which first appeared in 2024, has quickly developed from a comparatively unknown entity to one of the energetic ransomware teams globally, claiming over 200 victims worldwide in simply the primary quarter of 2025.

The malware primarily targets managed service suppliers (MSPs) and small-to-midsize companies (SMBs) throughout numerous industries, using a mixture of Distant Desktop Protocol (RDP) and Digital Non-public Community (VPN) intrusion strategies to penetrate organizational networks.

The ransomware group operates with a centralized management construction, distinguishing itself from the standard ransomware-as-a-service (RaaS) mannequin employed by many modern risk actors.

This operational method permits SafePay to keep up direct oversight of its infrastructure, sufferer negotiations, and assault execution, leading to extra coordinated and efficient campaigns.

The group’s fast ascension to prominence was highlighted by its involvement within the high-profile assault towards Ingram Micro, a world distributor serving 1000’s of companions and MSPs, demonstrating the malware’s functionality to disrupt essential provide chain infrastructure.

Acronis analysts recognized important similarities between SafePay and the notorious LockBit ransomware household, significantly the LockBit 3.0 builder whose supply code was leaked in 2022.

The technical evaluation reveals that SafePay employs basic but extremely efficient ways, together with the disabling of endpoint safety programs, deletion of shadow copies, and systematic clearing of system logs to suppress detection and incident response capabilities.

The malware’s persistence mechanisms and evasion strategies showcase a classy understanding of enterprise safety architectures and defensive measures.

The ransomware manifests as a PE32 DLL file with a intentionally falsified compilation timestamp, requiring particular execution parameters to operate correctly. SafePay implements a double extortion mannequin, combining information exfiltration with file encryption to maximise strain on victims.

The malware’s technical sophistication is obvious in its use of living-off-the-land binaries, which permits it to mix seamlessly with reputable system processes and evade conventional signature-based detection strategies.

An infection Mechanism and Knowledge Exfiltration

SafePay’s an infection mechanism depends closely on compromised RDP connections and VPN credentials, although the precise strategies of credential acquisition stay unclear.

Assault circulation (Supply – Acronis)

As soon as contained in the goal community, the malware executes a rigorously orchestrated sequence of operations designed to maximise information assortment whereas minimizing detection.

The ransomware employs the ShareFinder.ps1 script, sourced from an open-source PowerView challenge, to enumerate all accessible community shares inside the native area.

This reconnaissance section permits the malware to determine high-value targets and map the community infrastructure comprehensively.

The info assortment course of makes use of WinRAR with particular command-line parameters to archive delicate recordsdata whereas excluding sure file sorts to optimize storage and transmission effectivity.

The archiving command systematically excludes multimedia recordsdata, executables, and different non-critical information codecs, focusing as a substitute on paperwork, databases, and configuration recordsdata that usually comprise helpful enterprise info.

Following the archiving course of, SafePay deploys FileZilla shopper software program to exfiltrate the compressed archives to command-and-control servers, after which each WinRAR and FileZilla are systematically faraway from the compromised programs to get rid of forensic proof.

The ransomware’s encryption routine employs a sturdy mixture of AES and RSA algorithms, producing distinctive 32-byte AES keys for every file earlier than encrypting these keys with RSA public key cryptography.

This dual-layer encryption method ensures that even when one element is compromised, the general safety of the encrypted information stays intact.

SafePay appends the .safepay extension to encrypted recordsdata and requires a 32-byte password for full execution, implementing a number of safeguards towards evaluation and reverse engineering makes an attempt.

Examine reside malware habits, hint each step of an assault, and make sooner, smarter safety choices -> Strive ANY.RUN now

Cyber Security News Tags:Intruding, Leverages, Network, Organizations, Ransomware, RDP, SafePay, VPN

Post navigation

Previous Post: Microsoft Exchange Online Service Down
Next Post: US Sanction Key Threat Actors Linked With North Korea’s Remote IT Worker Scheme

Related Posts

Microsoft Windows 11 Insider Preview Build 26200.5600 Released Cyber Security News
Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs Cyber Security News
Malware Defense 101 – Identifying and Removing Modern Threats Cyber Security News
First Rowhammer Attack Targeting NVIDIA GPUs Cyber Security News
13-Year-Old Dylan – Youngest Security Researcher Collaborates with Microsoft Security Response Center Cyber Security News
2100+ Citrix Servers Vulnerable to Actively Exploited Bypass Authentication Vulnerability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • First Rowhammer Attack Targeting NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • First Rowhammer Attack Targeting NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News