You have 0 free articles left this month.
Register for a free account to access unlimited free content.
Powered by MOMENTUM MEDIA
lawyers weekly logo

Powered by MOMENTUMMEDIA

Breaking news and updates daily. Subscribe to our Newsletter
Advertisement

Exclusive: SafePay claims breach of Aussie fire protection services firm

Threat actors have claimed a cyber attack on an Australian fire protection service firm, listing the company on its dark web leak site and allegedly having exfiltrated data.

Exclusive: SafePay claims breach of Aus fire protection services firm
expand image

Extreme Fire Solutions is a Castle Hill, NSW-based company specialising in the installation and maintenance of essential fire protection services.

The SafePay ransomware operation listed Extreme Fire Solutions on its dark web leak site overnight, claiming to have exfiltrated 47 gigabytes of data.

While SafePay provided little to no information on the incident, it set a countdown timer for the publication of the data at just over three days at the time of writing. It also provided a “download listing” link, which is broken.

Cyber Daily reached out to Extreme Fire Solutions, which declined to comment on the matter.

SafePay is a relatively new player in the ransomware game, having first been observed active in October 2024.

The group has been observed targeting businesses in Australia, the United Kingdom, the United States, Italy, New Zealand, Canada, Belgium, Brazil, Germany, Barbados, and Argentina and, according to the group, is not a ransomware-as-a-service (RaaS) operation.

“SafePay ransomware has never provided and does not provide the RaaS,” it said on its dark web leak site.

However, a sample of the group’s ransom note grants some insight into SafePay’s operations.

“Greetings! Your corporate network was attacked by SafePay team. Your IT specialists made a number of mistakes in setting up the security of your corporate network, so we were able to spend quite a long period of time in it and compromise you,” SafePay said in its note, readme_safepay_ascii.txt.

“It was the misconfiguration of your network that allowed our experts to attack you, so treat this situation as simply as a paid training session for your system administrators.”

The note explained that the gang has encrypted “files of importance” and that particularly interesting files have been exfiltrated for later extortion and publication.

“Now we are in possession of your files such as: financial statements, intellectual property, accounting records, lawsuits and complaints, personnel and customer files, as well as files containing information on bank details, transactions and other internal documentation,” the note said.

The note also explained how to contact SafePay and outlined the gang’s motivations.

“We are not a politically motivated group and want nothing more than money. Provided you pay, we will honour all the terms we agreed to during the negotiation process,” it said.

Just last month, SafePay claimed a cyber attack on Brighton-Le-Sands-based contractor Brighton Australia.

Once again, SafePay shared little detail within the listing, only saying it had exfiltrated 160 gigabytes of data and provided two broken links to download the listing or view the data.

Daniel Croft

Daniel Croft

Born in the heart of Western Sydney, Daniel Croft is a passionate journalist with an understanding for and experience writing in the technology space. Having studied at Macquarie University, he joined Momentum Media in 2022, writing across a number of publications including Australian Aviation, Cyber Security Connect and Defence Connect. Outside of writing, Daniel has a keen interest in music, and spends his time playing in bands around Sydney.
You need to be a member to post comments. Become a member for free today!

newsletter
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.