Attack alert: safepay targets wachtmann.eu - DE
Introduction
The SafePay ransomware group has claimed responsibility for an attack against wachtmann.eu, a century-old German transportation company employing between 100 and 250 people and generating €50 million in revenue. This breach, detected on December 5, 2025, exposes the organization to a SIGNAL-classified criticality level according to our XC-Classify protocol, indicating an active threat requiring immediate monitoring. The incident comes amid a surge in attacks targeting sensitive business and customer data within the European logistics sector.
Founded in 1923, wachtmann.eu manages critical transportation and warehousing operations in Germany, handling strategic information about its customers and partners on a daily basis. This cyberattack reflects a worrying trend targeting logistics infrastructure, the true nerve centers of the European economy. Analysis of the verified data reveals that this intrusion could compromise not only the company's digital assets but also the supply chain of its numerous business partners.
Analyse détaillée
The malicious actor safepay published this claim on its leak site, confirming the exfiltration of files belonging to the German organization. The extracted metadata suggests a recent compromise, with the leak occurring in early December 2025. This attack raises crucial questions about the resilience of companies in the transportation sector to sophisticated cybercriminal threats, particularly in a country like Germany where data protection regulations are among the strictest in Europe.
The safepay cybercriminal collective represents an active threat in the current ransomware landscape, methodically targeting organizations across various economic sectors. Our analysis of the verified data indicates that this group operates according to a classic double extortion model: encryption of systems combined with the prior exfiltration of sensitive data, allowing for maximum pressure on victims.
Safepay's modus operandi relies on sophisticated intrusion techniques, generally exploiting vulnerabilities in exposed systems or initial attack vectors via targeted phishing. Once access is gained, the attackers establish persistence within the compromised environment before proceeding with the mass exfiltration of strategic files. This phase systematically precedes the actual ransomware deployment, thus maximizing leverage for negotiation.
The group's history reveals sustained activity with geographically distributed victims, demonstrating an international operational capability. Unlike some groups that specialize in specific sectors, Safepay adopts an opportunistic approach, targeting any organization with an exploitable attack surface and sufficient financial resources to consider paying a ransom.
Previous Safepay victims generally share common characteristics: medium to large-sized companies, the presence of sensitive business data, and sometimes insufficiently protected IT infrastructures. The group maintains an active leak website where data from organizations refusing to negotiate is gradually published, a strategy designed to increase psychological and reputational pressure. This "name and shame" tactic proves particularly effective against companies whose reputation is a critical asset, as is the case in the logistics sector where customer trust is paramount.
Wachtmann.eu embodies over a century of expertise in the German transportation sector, a remarkable longevity that testifies to its ability to adapt to economic and technological changes. Founded in 1923, the company has navigated the major transformations of the 20th century to become a recognized player in modern logistics in Germany. Its position in such a strategic sector as transport and warehousing makes it an essential link in many supply chains.
With a workforce of between 100 and 250 employees, the German organization has a structure agile enough to adapt to customer needs while maintaining the expertise necessary to manage complex logistics operations. With a turnover of €50 million, it is considered a mid-sized company (ETI) in the German ecosystem, a category particularly targeted by cybercriminals because it possesses substantial financial assets without necessarily having the cybersecurity budgets of large multinationals.
wachtmann.eu's business involves the daily handling of highly sensitive commercial data: customer information, shipping details, contractual data, transport schedules, and potentially strategic intelligence on its partners' logistics flows. This wealth of information makes it a prime target for malicious actors, as this data can be monetized in numerous ways: resale on the black market, industrial espionage, or simply as leverage in a ransom demand.
The company's location in Germany adds another dimension to the incident. The country rigorously applies the GDPR and has particularly vigilant data protection authorities. A breach of this magnitude exposes wachtmann.eu to strict legal notification obligations, both to the relevant authority (the Federal Data Protection and Information Freedom Agency - Bundesbeauftragte für den Datenschutz und die Informationsfreiheit) and to potentially affected individuals. The reputational impact in a sector where trust is the foundation of business relationships could be devastating, particularly if sensitive customer data were to be publicly disclosed.
The technical analysis of this breach reveals a criticality level classified as SIGNAL according to our certified XC-Classify protocol. This classification indicates an active threat requiring immediate monitoring and rapid response actions. Unlike the FULL, PARTIAL, or MINIMAL levels, which characterize the extent of data already exposed, the SIGNAL level signals an evolving situation where the malicious actor has issued a claim of responsibility without yet massively disclosing the exfiltrated files.
The precise nature of the compromised data is still under analysis, but given wachtmann.eu's activity, several categories of information are potentially involved. Logistics management systems typically contain detailed customer databases, including business contact information, order history, and contractual details. Transport planning platforms hold sensitive operational data: routes, schedules, shipment contents, and recipient identities. Administrative systems host HR, accounting, and legal files, the disclosure of which could seriously harm the organization.
The exact volume of exfiltrated information has not yet been disclosed by the safepay group, but an examination of the available metadata suggests a significant intrusion that granted access to strategic directories. The incident timeline indicates detection on December 5, 2025, with the claim of responsibility published the same day on the cybercriminal collective's leak website. This rapidity between compromise and public disclosure suggests either a delayed detection of the initial intrusion or a swift refusal to negotiate on the part of the victim.
The risk analysis for the exposed data reveals several concerning scenarios. First, the disclosure of customer information could lead to secondary attacks such as phishing or fraud targeting wachtmann.eu's business partners. Second, the exposure of operational logistics data could allow competitors to access strategic intelligence on the company's flows, rates, and methodologies. Third, the publication of internal files (HR, legal, financial) could severely destabilize the organization and affect its short-term operational capacity.
Questions Fréquentes
When did the attack by safepay on wachtmann.eu occur?
The attack occurred on December 5, 2025 and was claimed by safepay. The incident can be tracked directly on the dedicated alert page for wachtmann.eu.
Who is the victim of safepay?
The victim is wachtmann.eu and operates in the transportation sector. The company is located in Germany. Visit wachtmann.eu's official website. To learn more about the safepay threat actor and their other attacks, visit their dedicated page.
What is the XC protocol level for the attack on wachtmann.eu?
The XC protocol level is currently at XC SIGNAL status, meaning the attack on wachtmann.eu has been claimed by safepay but has not yet been confirmed by our community. Follow the progress of this alert.
Conclusion
The NIST score applied to this incident, although not yet finalized due to its SIGNAL status, should reflect the high criticality of a breach in the Transportation sector. Our XC-Classify protocol systematically assesses several dimensions: data sensitivity (high for logistics business information), number of people potentially affected (customers, employees, partners), regulatory impact (significant in Germany), and risks of a chain reaction (significant in an interconnected industry like transportation).