SafePay’s Typical Attack Pattern Initial Access: Primarily targets vulnerable virtual private network (VPN) implementations with brute force attacks Post-Compromise Activity: Uses common system administration and remote access tools Lateral Movement: Leverages compromised administrator credentials for network traversal Deployment Method: Utilizes unique techniques for ransomware deployment through domain controller registry modifications #cybersecurity #breach #incidentresponse #informationsecurity #networksecurity #CISO
A few weeks ago Surefire started tracking a new threat actor group, SafePay. Some details on this new group are in this post on our website. I'm happy to connect with anyone who wants to discuss this group further, and how they compare to other ransomware groups. As I've been saying for a while, there's a lot of movement amongst ransomware groups and that means more volatility. #ransomware #ir #informationsecurity #cyberthreatintelligence https://lnkd.in/esNm_3qV