Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month

Posted on September 5, 2025September 5, 2025 By CWS

A brand new ransomware menace has emerged as one among 2025’s most prolific cybercriminal operations, with SafePay ransomware claiming assaults towards 73 sufferer organizations in June alone, adopted by 42 extra victims in July.

This surge has positioned SafePay as a major menace actor that safety groups worldwide should perceive and put together to defend towards.

In contrast to conventional ransomware-as-a-service (RaaS) fashions that depend on affiliate networks, SafePay operates as a closed, impartial group that maintains strict operational safety.

The group’s rapid-fire assault methodology has confirmed remarkably efficient, with greater than 270 claimed victims documented all through 2025.

Their operations goal primarily mid-size and enterprise organizations throughout the US, Germany, Nice Britain, and Canada, specializing in industries vital to each day operations together with manufacturing, healthcare, and development.

Most affected industries (Supply – Bitdefender)

The group’s emergence will be traced again to September 2024, arising within the aftermath of great regulation enforcement operations that dismantled ALPHV (Black Cat) and severely disrupted LockBit’s infrastructure by Operation Cronos.

Bitdefender analysts recognized elements of the SafePay ransomware that complement functionalities related to LockBit, particularly LockBit Black, although the teams function with distinctly totally different methodologies and encryption processes.

SafePay demonstrates an alarming functionality to execute full assault chains inside 24-hour intervals, transferring from preliminary entry by encryption with devastating effectivity.

SafePay’s Victims Claimed Per Day (Supply – Bitdefender)

Their sufferer choice seems methodical, focusing on organizations with revenues sometimes round $5 million, although outliers embody entities with revenues exceeding $100 million and one sufferer surpassing $40 billion in income.

Encryption and Evasion Mechanisms

SafePay employs refined technical approaches that distinguish it from different ransomware households.

The malware makes use of the ChaCha20 encryption algorithm, implementing distinctive symmetric keys for every encrypted file whereas embedding extra keys straight inside the ransomware executable.

This dual-key strategy complicates restoration efforts and ensures that every sufferer’s encryption stays uniquely secured.

The ransomware demonstrates superior protection evasion capabilities, together with debugger detection avoidance and the flexibility to terminate processes related to anti-malware capabilities.

Upon execution, SafePay instantly begins eradicating quantity shadow copies to stop system restoration, then proceeds to encrypt recordsdata with the .safepay extension whereas deploying ransom notes named “readme_safepay.txt” in affected directories.

One notable technical attribute includes the malware’s geographic focusing on logic.

SafePay performs language keyboard detection to establish techniques utilizing Cyrillic keyboards, stopping execution on these techniques, suggesting potential Russian connections or alliances inside the menace actor ecosystem.

Enhance your SOC and assist your crew shield your online business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attacks, Claiming, Month, Organizations, Ransomware, SafePay, Single, Victim

Post navigation

Previous Post: TAG-150 Hackers Deploying Self-Developed Malware Families to Attack Organizations
Next Post: 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025

Related Posts

Hackers Leverage Hexstrike-AI Tool to Exploit Zero Day Vulnerabilities Within 10 Minutes Cyber Security News
ArmouryLoader Bypassing System Security Protections and Inject Malicious Codes Cyber Security News
Hackers Weaponized Linux Webcams as Attack Tools to Inject Keystrokes and Launch Attacks Cyber Security News
Gemini CLI Vulnerability Allows Hackers to Execute Malicious Commands on Developer Systems Cyber Security News
Hackers Started Exploiting CitrixBleed 2 Vulnerability Before Public PoC Disclosure Cyber Security News
Wireshark 4.4.9 Released With Fix For Critical Bugs and Updated Protocol Support Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing
  • 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025
  • SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month
  • TAG-150 Hackers Deploying Self-Developed Malware Families to Attack Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing
  • 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025
  • SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month
  • TAG-150 Hackers Deploying Self-Developed Malware Families to Attack Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News