MOXFIVE Threat Actor Spotlight - SafePay

Every month, we take a look at a current ransomware threat actor. If you would like to receive this via email each month, click below to subscribe to the MOXFIVE mailing list.

Additional Threat Actor Spotlights are available on our
Resources page >>

Subscribe
October 29, 2025

SafePay Overview

SafePay is a ransomware operation first observed in September 2024. Unlike affiliate-based programs, it does not operate as  Ransomware-as-a-Service (RaaS) and instead functions as a closed, internally managed group. Since its emergence, SafePay has grown rapidly, with its leak site listing more than 300 victims.

The group employs a double-extortion model, exfiltrating data before encrypting systems to increase leverage during negotiations. SafePay activity has most frequently impacted technology and manufacturing organizations, with the United States accounting for the majority of confirmed victims. Its operations rely on compromised credentials and remote-access abuse for entry, followed by the use of native Windows utilities, open-source scripts, and commodity tools to conduct discovery, exfiltration, and encryption.

Image showing the date leak website for World Leaks.

Figure 1: SafePay data leak site.

Key Highlights

Industries impacted by SafePay:

Since SafePay entered the threat landscape, they have primarily targeted technology and manufacturing and production organizations. These are followed by education, in addition to retail and hospitality, which together represent a significant portion of observed victims. Healthcare organizations have also been impacted, though at lower levels, maintaining a consistent presence among the group’s posted victims.

Global lnsights:

Victims impacted by SafePay span across countries in multiple regions with the United States accounting for the largest share of confirmed activity. Germany followed as the second most impacted country, while Canada and the United Kingdom each represented smaller portions of observed victims. Australia was also affected, though at a lower level compared to other regions.

Graph showing the top 5 industries impacted by World Leaks - Healthcare, Manufacturing, Retail & Hospitality, Construction & Engineering, and Energy.

Figure 2: Industries Impacted by SafePay

Initial Access:

Since emerging in late 2024, SafePay has primarily relied on exposed remote-access services and compromised credentials to gain entry to victim environments.

Encryption and Exfiltration:

SafePay uses a double-extortion model. The threat actors’ stage and compress stolen data before exfiltrating it to infrastructure under their control. Following exfiltration, the ransomware encrypts files and leaves a ransom note on affected systems directing victims to a Tor-based negotiation site. Recovery mechanisms such as shadow copies are often deleted, and leak-site publication is used to escalate pressure when negotiations fail.

Tooling and Execution:

SafePay threat actors combine native Windows utilities, open-source scripts, commodity tooling, and a bespoke encryptor to accelerate discovery, staging, exfiltration, and impact. Activity emphasizes automation, credential reuse, and removal of artifacts to limit detection and recovery.

If you would like to know more about SafePay or need assistance with incident response efforts, please contact us at 833-568-6695 or email our team at incident@moxfive.com.