[SAFEPAY] – Ransomware Victim: nod[.]ro
![[SAFEPAY] - Ransomware Victim: nod[.]ro 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: SAFEPAY
VICTIM NAME: nod[.]ro
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the SAFEPAY Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The ransomware leak page pertains to the victim domain “nod.ro,” a company operating in the technology sector based in Romania. The attack was publicly disclosed on July 12, 2025, with the breach occurring on the same day. The leak was announced by the threat group “safepay,” which claimed responsibility for the attack. The page features a screenshot indicating that sensitive information may have been compromised, although specific details are not provided. Notably, the leak includes various data elements, possibly containing confidential business or technological information. No explicit details of the data stolen are publicly shared, but the presence of a dedicated claim URL suggests active engagement by the threat actors.
This incident highlights the ongoing cyber threat landscape faced by organizations in the technology industry within Romania. The attack’s timing and disclosure follow current cybercrime trends, emphasizing the importance of robust cybersecurity defenses. The leak page does not specify the exact type of data stolen or whether any personally identifiable information (PII) was involved. However, the inclusion of a screenshot indicates that internal or sensitive information could be accessible. While no detailed data or files are linked publicly, the incident underscores the critical need for organizations to maintain strong security protocols to prevent and mitigate such breaches.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.