Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Posted on August 2, 2025August 2, 2025 By CWS

A brand new ransomware risk has emerged as probably the most aggressive cybercriminal operations of 2025, with SafePay ransomware claiming accountability for over 265 profitable assaults spanning a number of continents.

The group, which first appeared in September 2024 with restricted exercise concentrating on simply over 20 victims, has dramatically escalated its operations since early 2025, establishing itself as a formidable drive within the international ransomware panorama.

In contrast to conventional ransomware-as-a-service operations that depend on affiliate networks, SafePay operates as a centralized risk actor, conducting assaults instantly by their very own infrastructure and personnel.

SafePay Ransomware’s information leak website (DLS) (Supply – SOCRadar)

This operational mannequin has enabled the group to take care of tighter management over their campaigns whereas executing refined double-extortion schemes that mix information encryption with threatened publication of stolen delicate info on darkish net leak websites.

The geographic distribution of SafePay’s victims reveals a calculated concentrating on technique centered totally on developed economies.

The US bears the brunt of the assaults with 103 confirmed victims representing almost 40% of all identified instances, adopted by Germany with 47 documented incidents.

Extra targets span throughout the UK, Australia, Canada, and varied international locations all through Latin America and Asia-Pacific areas.

SOCRadar analysts recognized that SafePay intentionally avoids concentrating on organizations inside Commonwealth of Impartial States international locations by an embedded language detection mechanism.

The malware incorporates hardcoded checks that trigger quick termination if the contaminated system is configured for Armenian, Azerbaijari, Belarusian, Georgian, Kazakh, Russian, or Ukrainian languages, suggesting the operators search to keep away from prosecution inside these jurisdictions.

The ransomware demonstrates explicit effectiveness towards manufacturing, know-how, schooling, and enterprise providers sectors, although no business seems resistant to its attain.

Healthcare, transportation, finance, and public providers organizations have additionally fallen sufferer to the group’s operations, indicating an opportunistic quite than sector-specific concentrating on strategy.

Superior Persistence and Evasion Mechanisms

SafePay’s technical sophistication turns into obvious by its multi-layered persistence and protection evasion methods.

Simplified Cyber Kill Chain diagram of SafePay Ransomware (Supply – SOCRadar)

The malware employs professional distant entry instruments comparable to ConnectWise ScreenConnect to take care of long-term community presence, putting in these functions as persistent providers that mix seamlessly with professional administrative actions.

This strategy considerably reduces the chance of detection by endpoint safety programs, notably when attackers possess legitimate credentials for set up. The group’s protection evasion capabilities lengthen past easy antivirus bypass methods.

SafePay operators systematically disable Microsoft Defender and different safety options by administrative instructions and Group Coverage modifications, including folder exclusions and disabling real-time safety options.

Ransom notice of SafePay Ransomware (Supply – SOCRadar)

The malware itself makes use of encrypted strings, dynamic loading, and complex packing mechanisms to evade signature-based detection programs.

# Instance command used to disable Home windows Defender
Set-MpPreference -DisableRealtimeMonitoring $true
Set-MpPreference -DisableBehaviorMonitoring $true
Add-MpPreference -ExclusionPath “C:WindowsTemp”

Registry persistence mechanisms make sure the malware survives system reboots and maintains entry even after preliminary compromise vectors are found and remediated.

The risk actors create startup entries and modify system configurations to ensure their instruments stay energetic, whereas concurrently deploying customized backdoors like QDoor for added command execution and community tunneling capabilities.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Countries, Infected, Multiple, Ransomware, SafePay, Victims

Post navigation

Previous Post: Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS
Next Post: Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers

Related Posts

New Botnet Leverages DNS Misconfiguration to Launch Massive Cyber Attack Cyber Security News
Google Chrome May Soon Turn Webpages Into Podcasts With AI Audio Overviews Cyber Security News
224 Malicious Android Apps on Google Play With 38 Million Downloads Delivering Malicious Payloads Cyber Security News
Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab Cyber Security News
Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data Cyber Security News
DoJ Seizes $2.8 Million in Crypto From Zeppelin Ransomware Operators Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News