SHARE
Facebook X Pinterest WhatsApp

A Deeper Look at SafePay Following Ingram Micro Attack

SafePay ransomware group surges as a top threat with global attacks like Ingram Micro, driving urgent supply chain security measures.

Written By
thumbnail Jordan Smith
Jordan Smith
Jul 10, 2025
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

By now, virtually everyone in the channel knows Ingram Micro suffered an attack in early July that led to days of partial downtime. The global platform provider was hit by a ransomware group that first surfaced in 2024: SafePay.

Group now considered one of the most active in ransomware activity

Despite sounding like a secure online commerce platform, SafePay is the fourth most active ransomware group, as of March 2025, and became the most active group in May, according to one report.

On July 3, Ingram Micro’s website and online ordering systems went down, impacting their business in the U.S., Europe, and Asia, for which SafePay has claimed responsibility. Ingram Micro has not attributed the attack to any actor, however.

The company has since resumed normal operations and is once again operating globally, with online orders available.

The attack on Ingram Micro had a significant impact not only on the company itself but also on the entire ecosystem. An attack on a major third-party distributor is a significant event for most channel partners.

“The Ingram Micro ransomware incident underscores a critical inflection point: adversaries are increasingly targeting third-party distributors to exploit the supply chain ripple effect. This isn’t just about silenced servers– it’s a strategic escalation,” said Douglas McKee, executive director of threat research at SonicWall. “Organizations must stop viewing these distributors as peripheral and instead harden them as critical infrastructure. From segmented networks to zero-trust VPN access and continuous validation of MSP channels, we need to build resilience upstream, not just downstream. And that starts with embedded product security testing– proactively validating the software and systems in your stack before attackers get the chance.”

So, where did SafePay come from, and what do we know about this group so far?

Emergence of SafePay ransomware group

According to a report by Quorum Cyber, the first confirmed activity of SafePay ransomware occurred in September 2024, less than a year ago.

The group’s method of breach appears to involve operators gaining initial access to victim endpoints through a VPN gateway using valid credentials, likely obtained through stealware or purchased from dark web markets. SafePay employs double-extortion techniques, exfiltrating data before encrypting it, only to subsequently threaten to leak that stolen data unless a ransom is paid. 

In March 2025, SafePay had 43 confirmed victims to their dark web Data Leak Site (DLS), targeting both public and private sectors worldwide. The group has particularly targeted the U.S., Germany, and the U.K. in its attacks, with the most targeted sectors being manufacturing, construction, education, retail, and agriculture.

In March and April 2025, SafePay conducted coordinated targeting campaigns in two separate 24-hour periods against organizations based in Germany. The first was conducted on March 30, with 11 German organizations submitted to the DLS, and the second on April 17, with 10 more organizations added.

“SafePay is highly likely based within Russia as the group does not allow targeting of Commonwealth of Independent States (CIS),” Quorum’s research states. “This is commonly a trait of groups based within Russia.”

Threat intelligence enterprise Cyble released a ransomware landscape report for May 2025, highlighting SafePay as the top ransomware group for the month, a period during which ransomware groups claimed 384 victims.

SafePay is responsible for 58 claimed victims in May, according to Cyble, and 198 victims in total since the group first emerged.

Strategic partnership is one area where channel partners are looking to help defend against ransomware attacks. Read more about Halcyon’s latest partnership with Pax8 to make their anti-ransomware platform available to Pax8 partners.

thumbnail Jordan Smith

Jordan Smith is a news writer who has seven years of experience as a journalist, copywriter, podcaster, and copyeditor. He has worked with both written and audio media formats, contributing to IT publications such as MeriTalk, HCLTech, and Channel Insider, and participating in podcasts and panel moderation for IT events.

Recommended for you...

Kendra Krause on New Role at ThreatDown & Channel Goals
Victoria Durgin
Aug 25, 2025
SailPoint Intros Accelerated Application Management Solution
Jordan Smith
Aug 22, 2025
ConnectWise Partners with Proofpoint on Security in Asio
Jordan Smith
Aug 22, 2025
RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.