SafePay Ransomware

Description

SafePay is a relatively new and highly active ransomware group that first emerged in late 2024. The group has victimized more than 300 organizations worldwide.

Unlike many modern ransomware groups that operate under a Ransomware-as-a-Service (RaaS) model, SafePay manages the entire ransomware operation internally. The group acts as both developer and attacker, creating the ransomware, conducting intrusions, deploying payloads, and extorting victims without the use of affiliates. SafePay is believed to operate out of Eastern Europe, as its ransomware is designed to terminate execution if it detects that the infected system is using a language associated with former Soviet Union countries.

The SafePay ransomware group is also known for using phone calls as part of its double-extortion strategy, applying direct pressure on victims to coerce ransom payments.

Targeted Industries

  • Agriculture
  • Business Services
  • Construction
  • Consumer Services
  • Education
  • "Energy
  • Utilities & Waste"
  • Finance
  • Government
  • Healthcare Services
  • Hospitality
  • "Hospitals & Physicians Clinics"
  • Insurance
  • "Law Firms & Legal Services"
  • Manufacturing
  • "Media & Internet"
  • Publishing
  • "Minerals & Mining"
  • Organizations
  • Real Estate
  • Retail
  • Software
  • Telecommunications
  • Transportation

Objectives

Financial Gain

Known Tools Used

  • 7zip
  • FileZilla
  • Mimikatz
  • PowerShell
  • QDoor
  • RClone
  • ScreenConnect
  • ShareFinder
  • WinRAR

Known Infection Vectors

  • Access purchased from Initial Access Brokers (IAB)
  • Exploiting misconfiguration
  • Stolen credentials
  • Weak passwords

References

Ransomware Statistics and Ransomware Trends 2025

https://www.fortinet.com/resources/cyberglossary/ransomware-statistics

Active CVEs