[SAFEPAY] – Ransomware Victim: xortec[.]de

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the SAFEPAY Onion Dark Web Tor Blog page.

Ransomware group:
SAFEPAY
Victim name:
XORTEC[.]DE

AI Generated Summary of the Ransomware Leak Page

On October 24, 2025, a ransomware leak post associated with the domain xortec.de was published. The page presents the victim as a German technology company that functions as a value-added distributor and systems integrator for professional video surveillance, IP network infrastructure, and security-technology solutions. The organization is described as headquartered in Frankfurt with branch offices in Hamburg, Munich, Regensburg, and Berlin, employing several dozen staff. The post references a 2021 majority-stake acquisition by a private equity firm and notes that the company’s turnover at that time was in the low-to-mid tens of millions of euros. It also states that revenue remains project-driven and scales with large installation contracts for public and private clients. In the absence of a stated compromise date in the data, the post date is used as the published date for this leak item.

The leak page notes that a claim URL is present, but there are no embedded images or downloadable content on the page. It provides a corporate background profile of the victim, including a current revenue figure of €7.5 million and details about the company’s size and market. The post does not clearly state whether encryption or data exfiltration occurred, nor does it provide any ransom amount in the available text. Overall, the page reads more like a business profile update than a conventional attack-and-extortion narrative, with no visible screenshots and no explicit breach details beyond the organizational context.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features