[SAFEPAY] – Ransomware Victim: holtzofficesupport[.]com

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the SAFEPAY Onion Dark Web Tor Blog page.

Ransomware group:
SAFEPAY
Victim name:
HOLTZOFFICESUPPORT[.]COM

AI Generated Summary of the Ransomware Leak Page

On 2025-10-31 16:21:00.882862, a ransomware leak post publicly identifies Holtz Office Support GmbH as a victim. The German company is described as a family-owned, medium-sized firm headquartered in Wiesbaden and founded in 1956. The industry is not provided in the record. The post does not specify whether the incident resulted in encryption or data exposure, as the impact field is blank in the data. A claim URL is present on the leak page (defanged in this report), suggesting the attackers provide a link for negotiations or further information. The page contains no screenshots or downloadable content, and there are no additional links indicated. The description focuses on the victim’s background rather than technical details, and no ransom amount is disclosed in the available data.

Because no compromise date is provided, the post date above should be treated as the post date for this entry. The record shows zero images, no downloads, and no attachments, indicating an absence of visual or file evidence in the captured page. The only external pointer is the defanged claim URL; there is no explicit data size, data type, or encryption detail included in the data. For threat analysts, this entry signals a ransomware target involving a German mid-sized firm, with limited public details on the nature of the impact; continued monitoring and any additional public disclosures from the threat actors or the victim are advised.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features