SafePay Ransomware Hits 73 Organizations in a Single Month
The surge has continued, with another 42 victims published in July, marking SafePay’s second-highest tally to date. So far in 2025, the group has publicly named more than 270 victim organizations.
SafePay first surfaced in September 2024, several months after law enforcement dismantled the major ransomware players LockBit and ALPHV/BlackCat. While researchers have traceable evidence of code similarities to LockBit Black, SafePay has charted a distinct course.
It rejects the ransomware-as-a-service (RaaS) model, instead keeping its operations closed—a strategy that minimizes exposure, strengthens operational security, and ensures that the group retains all profits.
Unlike RaaS operators who rely on affiliates, SafePay conducts its own attacks against mid-sized and enterprise organizations, deliberately targeting partners within sprawling supply chains.
Its top victim demographics include companies in the U.S., Germany, the U.K., and Canada, with industries like manufacturing, healthcare, and construction being prime targets.
One hallmark of SafePay’s campaign has been its capacity to claim dozens of victims in a single day. On multiple occasions, it has published more than 10 organizations on its leak site within 24 hours, most notably 29 victims on March 30, 2025. This rivals even large affiliate-driven groups such as Qilin and Akira.
The key to this productivity lies in SafePay’s tactics, techniques, and procedures (TTPs). For initial access, the group leverages compromised credentials, brute-force attacks, or vulnerabilities in VPN appliances, occasionally bolstered by social engineering where attackers impersonate IT staff.
Once inside, discovery scripts like ShareFinder.ps1 allow them to locate sensitive network shares. Lateral movement is facilitated via PsExec, before exfiltration begins using tools such as WinRAR and FileZilla.
Encryption is handled by the ChaCha20 algorithm, with each file assigned a unique symmetric key. Files receive the “.safepay” extension, and ransom notes titled readme_safepay.txt direct victims to negotiate over Tor.
SafePay demands vary widely, often calculated against an organization’s revenue, with some victims exceeding $100M in turnover.
Researchers also note deliberate defense evasion measures, including debugger bypasses and process termination against security tools. The ransomware avoids execution on systems configured with Cyrillic keyboards, an indicator of possible Russian ties or alliances.
While SafePay does not interact with other threat actors or sell stolen data on underground forums, its streamlined operations and rapid-fire disclosures signal a new breed of ransomware group that thrives without affiliates.
Its efficiency, discretion, and aggressive publishing cadence have made it one of 2025’s most concerning ransomware threats, underscoring the urgent need for defenders to adopt multi-layered security, rapid patching, and proactive monitoring against this accelerating menace.
The following indicators are markers for the SafePay ransomware executable and note.
| SHA256 |
| a0dc80a37eb7e2716c02a94adc8df9baedec192a77bde31669faed228d9ff526 |
| 327b8b61eb446cc4f710771e44484f62b804ae3d262b57a56575053e2df67917 |
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post SafePay Ransomware Hits 73 Organizations in a Single Month appeared first on Cyber Security News.
Warning: This review contains full spoilers for The Pitt Season 2, Episode 9!Considering that The…
If you were having issues shopping on Amazon or loading your playlists on Amazon Music…
After President Donald Trump launched a war on Iran over the weekend without congressional authorization,…
Are you a huge fan of LEGO sets and yet consistently sticker-shocked by their exorbitant…
U.S. House Speaker Mike Johnson, R-La., speaks to reporters at the U.S. Capitol on March…
A package of child safety bills is headed to the House floor following an hours-long…
This website uses cookies.