Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SafePay Ransomware Leverages RDP and VPN for Intruding Into Organizations Network

SafePay Ransomware Leverages RDP and VPN for Intruding Into Organizations Network

Posted on July 10, 2025July 11, 2025 By CWS

A brand new ransomware risk has emerged as one of the formidable adversaries within the cybersecurity panorama, demonstrating unprecedented progress and class in its assault methodology.

SafePay ransomware, which first appeared in 2024, has quickly developed from a comparatively unknown entity to one of the energetic ransomware teams globally, claiming over 200 victims worldwide in simply the primary quarter of 2025.

The malware primarily targets managed service suppliers (MSPs) and small-to-midsize companies (SMBs) throughout numerous industries, using a mixture of Distant Desktop Protocol (RDP) and Digital Non-public Community (VPN) intrusion strategies to penetrate organizational networks.

The ransomware group operates with a centralized management construction, distinguishing itself from the standard ransomware-as-a-service (RaaS) mannequin employed by many modern risk actors.

This operational method permits SafePay to keep up direct oversight of its infrastructure, sufferer negotiations, and assault execution, leading to extra coordinated and efficient campaigns.

The group’s fast ascension to prominence was highlighted by its involvement within the high-profile assault towards Ingram Micro, a world distributor serving 1000’s of companions and MSPs, demonstrating the malware’s functionality to disrupt essential provide chain infrastructure.

Acronis analysts recognized important similarities between SafePay and the notorious LockBit ransomware household, significantly the LockBit 3.0 builder whose supply code was leaked in 2022.

The technical evaluation reveals that SafePay employs basic but extremely efficient ways, together with the disabling of endpoint safety programs, deletion of shadow copies, and systematic clearing of system logs to suppress detection and incident response capabilities.

The malware’s persistence mechanisms and evasion strategies showcase a classy understanding of enterprise safety architectures and defensive measures.

The ransomware manifests as a PE32 DLL file with a intentionally falsified compilation timestamp, requiring particular execution parameters to operate correctly. SafePay implements a double extortion mannequin, combining information exfiltration with file encryption to maximise strain on victims.

The malware’s technical sophistication is obvious in its use of living-off-the-land binaries, which permits it to mix seamlessly with reputable system processes and evade conventional signature-based detection strategies.

An infection Mechanism and Knowledge Exfiltration

SafePay’s an infection mechanism depends closely on compromised RDP connections and VPN credentials, although the precise strategies of credential acquisition stay unclear.

Assault circulation (Supply – Acronis)

As soon as contained in the goal community, the malware executes a rigorously orchestrated sequence of operations designed to maximise information assortment whereas minimizing detection.

The ransomware employs the ShareFinder.ps1 script, sourced from an open-source PowerView challenge, to enumerate all accessible community shares inside the native area.

This reconnaissance section permits the malware to determine high-value targets and map the community infrastructure comprehensively.

The info assortment course of makes use of WinRAR with particular command-line parameters to archive delicate recordsdata whereas excluding sure file sorts to optimize storage and transmission effectivity.

The archiving command systematically excludes multimedia recordsdata, executables, and different non-critical information codecs, focusing as a substitute on paperwork, databases, and configuration recordsdata that usually comprise helpful enterprise info.

Following the archiving course of, SafePay deploys FileZilla shopper software program to exfiltrate the compressed archives to command-and-control servers, after which each WinRAR and FileZilla are systematically faraway from the compromised programs to get rid of forensic proof.

The ransomware’s encryption routine employs a sturdy mixture of AES and RSA algorithms, producing distinctive 32-byte AES keys for every file earlier than encrypting these keys with RSA public key cryptography.

This dual-layer encryption method ensures that even when one element is compromised, the general safety of the encrypted information stays intact.

SafePay appends the .safepay extension to encrypted recordsdata and requires a 32-byte password for full execution, implementing a number of safeguards towards evaluation and reverse engineering makes an attempt.

Examine reside malware habits, hint each step of an assault, and make sooner, smarter safety choices -> Strive ANY.RUN now

Cyber Security News Tags:Intruding, Leverages, Network, Organizations, Ransomware, RDP, SafePay, VPN

Post navigation

Previous Post: Microsoft Exchange Online Service Down
Next Post: US Sanction Key Threat Actors Linked With North Korea’s Remote IT Worker Scheme

Related Posts

Critical SonicWall SSL VPN Vulnerability Let Attackers Trigger DoS Attack Critical SonicWall SSL VPN Vulnerability Let Attackers Trigger DoS Attack Cyber Security News
CISA Releases 3 ICS Advisories Covering Vulnerabilities and Exploits CISA Releases 3 ICS Advisories Covering Vulnerabilities and Exploits Cyber Security News
Beware of Fake AI Business Tools That Hides Ransomware Beware of Fake AI Business Tools That Hides Ransomware Cyber Security News
Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code Cyber Security News
Androxgh0st Botnet Operators Exploiting US University For Hosting C2 Logger Androxgh0st Botnet Operators Exploiting US University For Hosting C2 Logger Cyber Security News
Microsoft Launches Open-Source WinApp CLI to Streamline Windows App Development Microsoft Launches Open-Source WinApp CLI to Streamline Windows App Development Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News