Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SafePay Ransomware Infected 260+ Victims Across Multiple Countries

SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Posted on August 2, 2025August 2, 2025 By CWS

A brand new ransomware risk has emerged as probably the most aggressive cybercriminal operations of 2025, with SafePay ransomware claiming accountability for over 265 profitable assaults spanning a number of continents.

The group, which first appeared in September 2024 with restricted exercise concentrating on simply over 20 victims, has dramatically escalated its operations since early 2025, establishing itself as a formidable drive within the international ransomware panorama.

In contrast to conventional ransomware-as-a-service operations that depend on affiliate networks, SafePay operates as a centralized risk actor, conducting assaults instantly by their very own infrastructure and personnel.

SafePay Ransomware’s information leak website (DLS) (Supply – SOCRadar)

This operational mannequin has enabled the group to take care of tighter management over their campaigns whereas executing refined double-extortion schemes that mix information encryption with threatened publication of stolen delicate info on darkish net leak websites.

The geographic distribution of SafePay’s victims reveals a calculated concentrating on technique centered totally on developed economies.

The US bears the brunt of the assaults with 103 confirmed victims representing almost 40% of all identified instances, adopted by Germany with 47 documented incidents.

Extra targets span throughout the UK, Australia, Canada, and varied international locations all through Latin America and Asia-Pacific areas.

SOCRadar analysts recognized that SafePay intentionally avoids concentrating on organizations inside Commonwealth of Impartial States international locations by an embedded language detection mechanism.

The malware incorporates hardcoded checks that trigger quick termination if the contaminated system is configured for Armenian, Azerbaijari, Belarusian, Georgian, Kazakh, Russian, or Ukrainian languages, suggesting the operators search to keep away from prosecution inside these jurisdictions.

The ransomware demonstrates explicit effectiveness towards manufacturing, know-how, schooling, and enterprise providers sectors, although no business seems resistant to its attain.

Healthcare, transportation, finance, and public providers organizations have additionally fallen sufferer to the group’s operations, indicating an opportunistic quite than sector-specific concentrating on strategy.

Superior Persistence and Evasion Mechanisms

SafePay’s technical sophistication turns into obvious by its multi-layered persistence and protection evasion methods.

Simplified Cyber Kill Chain diagram of SafePay Ransomware (Supply – SOCRadar)

The malware employs professional distant entry instruments comparable to ConnectWise ScreenConnect to take care of long-term community presence, putting in these functions as persistent providers that mix seamlessly with professional administrative actions.

This strategy considerably reduces the chance of detection by endpoint safety programs, notably when attackers possess legitimate credentials for set up. The group’s protection evasion capabilities lengthen past easy antivirus bypass methods.

SafePay operators systematically disable Microsoft Defender and different safety options by administrative instructions and Group Coverage modifications, including folder exclusions and disabling real-time safety options.

Ransom notice of SafePay Ransomware (Supply – SOCRadar)

The malware itself makes use of encrypted strings, dynamic loading, and complex packing mechanisms to evade signature-based detection programs.

# Instance command used to disable Home windows Defender
Set-MpPreference -DisableRealtimeMonitoring $true
Set-MpPreference -DisableBehaviorMonitoring $true
Add-MpPreference -ExclusionPath “C:WindowsTemp”

Registry persistence mechanisms make sure the malware survives system reboots and maintains entry even after preliminary compromise vectors are found and remediated.

The risk actors create startup entries and modify system configurations to ensure their instruments stay energetic, whereas concurrently deploying customized backdoors like QDoor for added command execution and community tunneling capabilities.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Countries, Infected, Multiple, Ransomware, SafePay, Victims

Post navigation

Previous Post: Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS
Next Post: Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers

Related Posts

WAFs protection Bypassed to Execute XSS Payloads Using JS Injection with Parameter Pollution WAFs protection Bypassed to Execute XSS Payloads Using JS Injection with Parameter Pollution Cyber Security News
Managing Data Subject Access Requests in Compliance Programs Managing Data Subject Access Requests in Compliance Programs Cyber Security News
Chinese Front Companies Providing Advanced Steganography Solutions for APT Operations Chinese Front Companies Providing Advanced Steganography Solutions for APT Operations Cyber Security News
Pro-Iranian Hacktivists Targeting US Networks Department of Homeland Security Warns Pro-Iranian Hacktivists Targeting US Networks Department of Homeland Security Warns Cyber Security News
New Obex Tool Blocks EDR Dynamic Libraries From Loading at Runtime New Obex Tool Blocks EDR Dynamic Libraries From Loading at Runtime Cyber Security News
BlueNoroff Hackers Weaponize Zoom App to Attack System Using Infostealer Malware BlueNoroff Hackers Weaponize Zoom App to Attack System Using Infostealer Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News