Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Posted on August 2, 2025August 2, 2025 By CWS

A brand new ransomware risk has emerged as probably the most aggressive cybercriminal operations of 2025, with SafePay ransomware claiming accountability for over 265 profitable assaults spanning a number of continents.

The group, which first appeared in September 2024 with restricted exercise concentrating on simply over 20 victims, has dramatically escalated its operations since early 2025, establishing itself as a formidable drive within the international ransomware panorama.

In contrast to conventional ransomware-as-a-service operations that depend on affiliate networks, SafePay operates as a centralized risk actor, conducting assaults instantly by their very own infrastructure and personnel.

SafePay Ransomware’s information leak website (DLS) (Supply – SOCRadar)

This operational mannequin has enabled the group to take care of tighter management over their campaigns whereas executing refined double-extortion schemes that mix information encryption with threatened publication of stolen delicate info on darkish net leak websites.

The geographic distribution of SafePay’s victims reveals a calculated concentrating on technique centered totally on developed economies.

The US bears the brunt of the assaults with 103 confirmed victims representing almost 40% of all identified instances, adopted by Germany with 47 documented incidents.

Extra targets span throughout the UK, Australia, Canada, and varied international locations all through Latin America and Asia-Pacific areas.

SOCRadar analysts recognized that SafePay intentionally avoids concentrating on organizations inside Commonwealth of Impartial States international locations by an embedded language detection mechanism.

The malware incorporates hardcoded checks that trigger quick termination if the contaminated system is configured for Armenian, Azerbaijari, Belarusian, Georgian, Kazakh, Russian, or Ukrainian languages, suggesting the operators search to keep away from prosecution inside these jurisdictions.

The ransomware demonstrates explicit effectiveness towards manufacturing, know-how, schooling, and enterprise providers sectors, although no business seems resistant to its attain.

Healthcare, transportation, finance, and public providers organizations have additionally fallen sufferer to the group’s operations, indicating an opportunistic quite than sector-specific concentrating on strategy.

Superior Persistence and Evasion Mechanisms

SafePay’s technical sophistication turns into obvious by its multi-layered persistence and protection evasion methods.

Simplified Cyber Kill Chain diagram of SafePay Ransomware (Supply – SOCRadar)

The malware employs professional distant entry instruments comparable to ConnectWise ScreenConnect to take care of long-term community presence, putting in these functions as persistent providers that mix seamlessly with professional administrative actions.

This strategy considerably reduces the chance of detection by endpoint safety programs, notably when attackers possess legitimate credentials for set up. The group’s protection evasion capabilities lengthen past easy antivirus bypass methods.

SafePay operators systematically disable Microsoft Defender and different safety options by administrative instructions and Group Coverage modifications, including folder exclusions and disabling real-time safety options.

Ransom notice of SafePay Ransomware (Supply – SOCRadar)

The malware itself makes use of encrypted strings, dynamic loading, and complex packing mechanisms to evade signature-based detection programs.

# Instance command used to disable Home windows Defender
Set-MpPreference -DisableRealtimeMonitoring $true
Set-MpPreference -DisableBehaviorMonitoring $true
Add-MpPreference -ExclusionPath “C:WindowsTemp”

Registry persistence mechanisms make sure the malware survives system reboots and maintains entry even after preliminary compromise vectors are found and remediated.

The risk actors create startup entries and modify system configurations to ensure their instruments stay energetic, whereas concurrently deploying customized backdoors like QDoor for added command execution and community tunneling capabilities.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Countries, Infected, Multiple, Ransomware, SafePay, Victims

Post navigation

Previous Post: Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS
Next Post: Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers

Related Posts

20 Best Kubernetes Monitoring Tools in 2025 Cyber Security News
Ransomware Negotiation When and How to Engage Attackers Cyber Security News
VS Code Extension Weaponized With Two Lines of Code Leads to Supply Chain Attack Cyber Security News
Quid Miner Launches Mobile App to Unlock in Daily Cloud Mining Income for BTC, DOGE, and XRP for Investors Cyber Security News
How Anat Heilper Orchestrates Breakthroughs In Silicon And Software Cyber Security News
Sophisticated Skitnet Malware Actively Adopted by Ransomware Gangs to Streamline Operations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
  • Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
  • SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
  • Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
  • SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News