[SAFEPAY] – Ransomware Victim: palmasdelixcan[.]com
![[SAFEPAY] - Ransomware Victim: palmasdelixcan[.]com 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: SAFEPAY
VICTIM NAME: palmasdelixcan[.]com
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the SAFEPAY Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The ransomware leak page pertains to a domain associated with the victim identified as palmasdelixcan.com. The attack is recorded with a confirmed attack date of July 16, 2025, and was discovered shortly thereafter. The site includes a screenshot capturing visual evidence related to the incident, which appears to depict internal data or overall system status. The leak is attributed to a group named Safepay. No information about employee count, third-party involvement, or specific stolen data was provided, indicating a limited data breach disclosure.
The page provides a link to the claim URL through the Tor network, suggesting that it hosts or links to sensitive data or proof of compromise. The description section indicates that the content is AI-generated and labeled as ‘N/A,’ meaning there is no detailed description of the data exposed. The attack timeline suggests that the incident was detected and shared almost immediately. No specific details about the type of data stolen or the nature of the attack are included, and there are no references to PII or sensitive information, emphasizing the anonymized and high-level nature of the leak notice. The visual evidence included shows a screenshot, possibly of compromised systems or internal documentation, but no explicit content is summarized in the report.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.