Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Posted on August 2, 2025August 2, 2025 By CWS

A brand new ransomware risk has emerged as probably the most aggressive cybercriminal operations of 2025, with SafePay ransomware claiming accountability for over 265 profitable assaults spanning a number of continents.

The group, which first appeared in September 2024 with restricted exercise concentrating on simply over 20 victims, has dramatically escalated its operations since early 2025, establishing itself as a formidable drive within the international ransomware panorama.

In contrast to conventional ransomware-as-a-service operations that depend on affiliate networks, SafePay operates as a centralized risk actor, conducting assaults instantly by their very own infrastructure and personnel.

SafePay Ransomware’s information leak website (DLS) (Supply – SOCRadar)

This operational mannequin has enabled the group to take care of tighter management over their campaigns whereas executing refined double-extortion schemes that mix information encryption with threatened publication of stolen delicate info on darkish net leak websites.

The geographic distribution of SafePay’s victims reveals a calculated concentrating on technique centered totally on developed economies.

The US bears the brunt of the assaults with 103 confirmed victims representing almost 40% of all identified instances, adopted by Germany with 47 documented incidents.

Extra targets span throughout the UK, Australia, Canada, and varied international locations all through Latin America and Asia-Pacific areas.

SOCRadar analysts recognized that SafePay intentionally avoids concentrating on organizations inside Commonwealth of Impartial States international locations by an embedded language detection mechanism.

The malware incorporates hardcoded checks that trigger quick termination if the contaminated system is configured for Armenian, Azerbaijari, Belarusian, Georgian, Kazakh, Russian, or Ukrainian languages, suggesting the operators search to keep away from prosecution inside these jurisdictions.

The ransomware demonstrates explicit effectiveness towards manufacturing, know-how, schooling, and enterprise providers sectors, although no business seems resistant to its attain.

Healthcare, transportation, finance, and public providers organizations have additionally fallen sufferer to the group’s operations, indicating an opportunistic quite than sector-specific concentrating on strategy.

Superior Persistence and Evasion Mechanisms

SafePay’s technical sophistication turns into obvious by its multi-layered persistence and protection evasion methods.

Simplified Cyber Kill Chain diagram of SafePay Ransomware (Supply – SOCRadar)

The malware employs professional distant entry instruments comparable to ConnectWise ScreenConnect to take care of long-term community presence, putting in these functions as persistent providers that mix seamlessly with professional administrative actions.

This strategy considerably reduces the chance of detection by endpoint safety programs, notably when attackers possess legitimate credentials for set up. The group’s protection evasion capabilities lengthen past easy antivirus bypass methods.

SafePay operators systematically disable Microsoft Defender and different safety options by administrative instructions and Group Coverage modifications, including folder exclusions and disabling real-time safety options.

Ransom notice of SafePay Ransomware (Supply – SOCRadar)

The malware itself makes use of encrypted strings, dynamic loading, and complex packing mechanisms to evade signature-based detection programs.

# Instance command used to disable Home windows Defender
Set-MpPreference -DisableRealtimeMonitoring $true
Set-MpPreference -DisableBehaviorMonitoring $true
Add-MpPreference -ExclusionPath “C:WindowsTemp”

Registry persistence mechanisms make sure the malware survives system reboots and maintains entry even after preliminary compromise vectors are found and remediated.

The risk actors create startup entries and modify system configurations to ensure their instruments stay energetic, whereas concurrently deploying customized backdoors like QDoor for added command execution and community tunneling capabilities.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Countries, Infected, Multiple, Ransomware, SafePay, Victims

Post navigation

Previous Post: Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS
Next Post: Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers

Related Posts

Quantum Threats Preparing Your Encryption Strategy Cyber Security News
Microsoft and CrowdStrike Teaming Up to Bring Clarity To Threat Actor Mapping Cyber Security News
Microsoft Releases Mitigations and Threat Hunting Queries for SharePoint Zero-Day Cyber Security News
Multiple HPE StoreOnce Vulnerabilities Let Attackers Execute Malicious Code Remotely Cyber Security News
Ransomware 2.0 How AI-Powered Attacks Are Evolving Cyber Security News
IXON VPN Client Vulnerability Let Attackers Escalate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Safely Use Free Wi-Fi at Cafes and Airports
  • CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign
  • New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Safely Use Free Wi-Fi at Cafes and Airports
  • CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign
  • New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News