[SAFEPAY] – Ransomware Victim: lafayettefamilyymca[.]org
![[SAFEPAY] - Ransomware Victim: lafayettefamilyymca[.]org 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: SAFEPAY
VICTIM NAME: lafayettefamilyymca[.]org
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the SAFEPAY Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The ransomware leak page pertains to the Lafayette Family YMCA, a non-profit community organization based in Lafayette, Indiana, USA. The organization provides various programs focused on youth development, health, and social responsibility, including childcare, fitness classes, swimming lessons, and summer camps. The attack was discovered on July 1, 2025, and the breach is believed to have involved the compromise of sensitive organizational data. The leak includes screenshots of internal documents and data related to the organization’s operations. No specific personal identifiers or PII are publicly disclosed in the leak, but the incident highlights potential vulnerabilities in the organization’s cybersecurity posture.
The affected entity belongs to the public sector and has been categorized under the “safepay” group, indicating a focus on financial or payment-related data security issues. The incident involved the release of data via a dark web portal, with a provided link to the leak’s page. The leak may include confidential information or data relevant to the organization’s operations, but publicly available details do not specify the exact nature of the compromised data. The organization appears to have an active presence online, with the incident bringing attention to the importance of securing sensitive community data against cyber threats.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.