[SAFEPAY] – Ransomware Victim: greenhouseapt[.]com
![[SAFEPAY] - Ransomware Victim: greenhouseapt[.]com 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the SAFEPAY Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The leak page is attributed to the Safepay group and centers on greenhouseapt.com as the victim. The page presents The Greenhouse as a Boston-based apartment building and property management/letting operation in the Back Bay / South End, offering 1–3 bedroom units with amenities such as a rooftop pool, fitness centre, and concierge services. The public-facing description suggests a premium central-city product, noting that unit types, floorplans, and market rents are listed on the property’s public site, with example rents for a one-bedroom around $3,500–$4,300. The post includes a line mentioning revenue in the vicinity of USD 5 million, consistent with a mid-sized residential operator. A claim URL appears to be present on the page (claim_url_present: true), which indicates a ransom/contact mechanism, though the excerpt provided does not detail any encryption actions or data exfiltration. For context, the victim’s name is greenhouseapt.com, retained verbatim as the primary identifier in the leak listing.
Regarding media, the dataset shows no screenshots or image attachments on the leak page (images_count: 0; downloads_present: false; annotations lists are empty). The visible text excerpt from the page resembles a marketing/blog narrative about the property rather than an archive of stolen files or internal documents. The post date tied to the leak entry is 2025-10-24 21:22:09.003915, with the body excerpt itself dated 2025-10-24 19:13, indicating the material originated from a public-facing post on greenhouseapt[.]com. No other company names are highlighted beyond the victim name; the content does not provide explicit detail about encryption status or data types, and the observed impact in the public fragment is limited to branding and business information rather than concrete exfiltration artifacts.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
