Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month

Posted on September 5, 2025September 5, 2025 By CWS

A brand new ransomware menace has emerged as one among 2025’s most prolific cybercriminal operations, with SafePay ransomware claiming assaults towards 73 sufferer organizations in June alone, adopted by 42 extra victims in July.

This surge has positioned SafePay as a major menace actor that safety groups worldwide should perceive and put together to defend towards.

In contrast to conventional ransomware-as-a-service (RaaS) fashions that depend on affiliate networks, SafePay operates as a closed, impartial group that maintains strict operational safety.

The group’s rapid-fire assault methodology has confirmed remarkably efficient, with greater than 270 claimed victims documented all through 2025.

Their operations goal primarily mid-size and enterprise organizations throughout the US, Germany, Nice Britain, and Canada, specializing in industries vital to each day operations together with manufacturing, healthcare, and development.

Most affected industries (Supply – Bitdefender)

The group’s emergence will be traced again to September 2024, arising within the aftermath of great regulation enforcement operations that dismantled ALPHV (Black Cat) and severely disrupted LockBit’s infrastructure by Operation Cronos.

Bitdefender analysts recognized elements of the SafePay ransomware that complement functionalities related to LockBit, particularly LockBit Black, although the teams function with distinctly totally different methodologies and encryption processes.

SafePay demonstrates an alarming functionality to execute full assault chains inside 24-hour intervals, transferring from preliminary entry by encryption with devastating effectivity.

SafePay’s Victims Claimed Per Day (Supply – Bitdefender)

Their sufferer choice seems methodical, focusing on organizations with revenues sometimes round $5 million, although outliers embody entities with revenues exceeding $100 million and one sufferer surpassing $40 billion in income.

Encryption and Evasion Mechanisms

SafePay employs refined technical approaches that distinguish it from different ransomware households.

The malware makes use of the ChaCha20 encryption algorithm, implementing distinctive symmetric keys for every encrypted file whereas embedding extra keys straight inside the ransomware executable.

This dual-key strategy complicates restoration efforts and ensures that every sufferer’s encryption stays uniquely secured.

The ransomware demonstrates superior protection evasion capabilities, together with debugger detection avoidance and the flexibility to terminate processes related to anti-malware capabilities.

Upon execution, SafePay instantly begins eradicating quantity shadow copies to stop system restoration, then proceeds to encrypt recordsdata with the .safepay extension whereas deploying ransom notes named “readme_safepay.txt” in affected directories.

One notable technical attribute includes the malware’s geographic focusing on logic.

SafePay performs language keyboard detection to establish techniques utilizing Cyrillic keyboards, stopping execution on these techniques, suggesting potential Russian connections or alliances inside the menace actor ecosystem.

Enhance your SOC and assist your crew shield your online business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attacks, Claiming, Month, Organizations, Ransomware, SafePay, Single, Victim

Post navigation

Previous Post: TAG-150 Hackers Deploying Self-Developed Malware Families to Attack Organizations
Next Post: 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025

Related Posts

Jaguar Land Rover Confirms Cybersecurity Incident Impacts Global IT Systems Cyber Security News
Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System Cyber Security News
VMware Tools and Aria Operations Vulnerabilities Let Attackers Escalate Privileges to Root Cyber Security News
CISA Releases Nine ICS Advisories Surrounding Vulnerabilities, and Exploits Cyber Security News
10 Best Internal Network Penetration Testing Companies in 2025 Cyber Security News
Microsoft, SentinelOne, and Palo Alto Networks Withdraw from 2026 MITRE ATT&CK Evaluations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Warns of Exploited Apple, Kentico, Microsoft Vulnerabilities
  • New LOSTKEYS Malware Linked to Russia State-Sponsored Hacker Group COLDRIVER
  • Dataminr to Acquire ThreatConnect for $290 Million
  • 131 Malicious Extensions Targeting WhatsApp Used Found in Chrome Web Store
  • Securing AI to Benefit from AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Warns of Exploited Apple, Kentico, Microsoft Vulnerabilities
  • New LOSTKEYS Malware Linked to Russia State-Sponsored Hacker Group COLDRIVER
  • Dataminr to Acquire ThreatConnect for $290 Million
  • 131 Malicious Extensions Targeting WhatsApp Used Found in Chrome Web Store
  • Securing AI to Benefit from AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News