Wednesday , September 10 2025

SafePay Ransomware
SafePay Ransomware Attacks 73 Orgs in a Single Month

The global ransomware landscape continues to shift in 2025, with SafePay rapidly emerging as one of the most active and disruptive groups. In June, SafePay claimed responsibility for attacks on 73 victim organizations, a record-breaking monthly tally that placed it at the top of Bitdefender’s Threat Debrief rankings.

The surge has continued, with another 42 victims published in July, marking SafePay’s second-highest tally to date. So far in 2025, the group has publicly named more than 270 victim organizations.

Microsft warns of active directory and office vulnarabilty

Microsoft has issued a new warning about a critical security vulnerability in Active Directory Domain Services, known as CVE-2025-21293. An...
Read More
Microsft warns of active directory and office vulnarabilty

(CVE-2025-10159)
Sophos Addressed Critical Auth Bypass flaw in Wireless Access Points

Sophos fixed an authentication bypass vulnerability in its AP6 Series Wireless Access Points, preventing attackers from obtaining admin privileges. The...
Read More
(CVE-2025-10159)  Sophos Addressed Critical Auth Bypass flaw in Wireless Access Points

1.6M fitness phone call recordings exposed online

Security researcher Jeremiah Fowler discovered a database containing sensitive information from gym customers and staff, including names, financial details, and...
Read More
1.6M fitness phone call recordings exposed online

Microsoft September Patch Tuesday 2025 fixes 81 flaws, two zero-days

Microsoft patched September 2025 Patch Tuesday 81 flaws, including two publicly disclosed zero-day vulnerabilities. This Patch Tuesday addresses nine critical...
Read More
Microsoft September Patch Tuesday 2025 fixes 81 flaws, two zero-days

Elastic Security Incident : Hackers Accessed Email Account Contains Valid Credentials

Elastic reported a security incident caused by a breach at Salesloft Drift, leading to unauthorized access to an internal email...
Read More
Elastic Security Incident : Hackers Accessed Email Account Contains Valid Credentials

Hacker Exploit Amazon SES to Send 50K Phishing Emails

Researchers at Wiz discovered a complex phishing campaign using Amazon's Simple Email Service (SES) for large-scale attacks, showing how hacked...
Read More
Hacker Exploit Amazon SES to Send 50K Phishing Emails

SafePay Ransomware
SafePay Ransomware Attacks 73 Orgs in a Single Month

The global ransomware landscape continues to shift in 2025, with SafePay rapidly emerging as one of the most active and...
Read More
SafePay Ransomware  SafePay Ransomware Attacks 73 Orgs in a Single Month

Bangladesh Cyber Threat Landscape- 2024
602 Vuln exploited: Afftected daily 905 IP In Bangladesh in 2024

Bangladesh Cyber Threat Landscape 2024, by BGD e-GOV CIRT, reveals a sharp escalation in cyber threats across Bangladesh. The year...
Read More
Bangladesh Cyber Threat Landscape- 2024  602 Vuln exploited: Afftected daily 905 IP In Bangladesh in 2024

AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack

Investigations into the Nx "s1ngularity" NPM supply chain attack have unveiled a massive fallout, with thousands of account tokens and...
Read More
AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack

ISC2 Aims to Bridge DFIR Skill Gap with New Certificate

ISC2 has launched a Threat Handling Foundations Certificate to assist cybersecurity experts in enhancing Digital Forensics and Incident Response (DFIR)...
Read More
ISC2 Aims to Bridge DFIR Skill Gap with New Certificate

SafePay first surfaced in September 2024, several months after law enforcement dismantled the major ransomware players LockBit and ALPHV/BlackCat. While researchers have traceable evidence of code similarities to LockBit Black, SafePay has charted a distinct course.

It rejects the ransomware-as-a-service (RaaS) model, instead keeping its operations closed—a strategy that minimizes exposure, strengthens operational security, and ensures that the group retains all profits.

Unlike RaaS operators who rely on affiliates, SafePay conducts its own attacks against mid-sized and enterprise organizations, deliberately targeting partners within sprawling supply chains.

Its top victim demographics include companies in the U.S., Germany, the U.K., and Canada, with industries like manufacturing, healthcare, and construction being prime targets.

A 24-Hour Blitzkrieg:

One hallmark of SafePay’s campaign has been its capacity to claim dozens of victims in a single day. On multiple occasions, it has published more than 10 organizations on its leak site within 24 hours, most notably 29 victims on March 30, 2025. This rivals even large affiliate-driven groups such as Qilin and Akira.

The key to this productivity lies in SafePay’s tactics, techniques, and procedures (TTPs). For initial access, the group leverages compromised credentials, brute-force attacks, or vulnerabilities in VPN appliances, occasionally bolstered by social engineering where attackers impersonate IT staff.

Once inside, discovery scripts like ShareFinder.ps1 allow them to locate sensitive network shares. Lateral movement is facilitated via PsExec, before exfiltration begins using tools such as WinRAR and FileZilla.

Encryption is handled by the ChaCha20 algorithm, with each file assigned a unique symmetric key. Files receive the “.safepay” extension, and ransom notes titled readme_safepay.txt direct victims to negotiate over Tor.

SafePay demands vary widely, often calculated against an organization’s revenue, with some victims exceeding $100M in turnover.

Researchers also note deliberate defense evasion measures, including debugger bypasses and process termination against security tools. The ransomware avoids execution on systems configured with Cyrillic keyboards, an indicator of possible Russian ties or alliances.

The Larger Picture:

While SafePay does not interact with other threat actors or sell stolen data on underground forums, its streamlined operations and rapid-fire disclosures signal a new breed of ransomware group that thrives without affiliates.

Safepages contact Page:

Its efficiency, discretion, and aggressive publishing cadence have made it one of 2025’s most concerning ransomware threats, underscoring the urgent need for defenders to adopt multi-layered security, rapid patching, and proactive monitoring against this accelerating menace.

602 Vuln exploited: Afftected daily 905 IP In Bangladesh in 2024 – InfoSecBulletin

Check Also

SES

Hacker Exploit Amazon SES to Send 50K Phishing Emails

Researchers at Wiz discovered a complex phishing campaign using Amazon’s Simple Email Service (SES) for …