Company Details
psafeus
2
0
5415
psafe.com
0
PSA_3051448
In-progress

PSafe US Company CyberSecurity Posture
psafe.comPSafe Technology is a leader in cybersecurity solutions. We develop products and services to shield devices and data from online dangers like malware, viruses, and ever-evolving security weaknesses. With experience and reputation, the company keeps your systems and information safe. Our mobile product is dfndr security, focused on Android users. It safeguards your phone against malware, phishing scams, and identity theft with the most relevant security features. PSafe's apps use artificial intelligence and machine learning to protect what's most important to you. Beyond mobile security. PSafe's innovative applications provide valuable insights to strengthen your overall security posture. =================================================== Dfndr security https://play.google.com/store/apps/details?id=com.psafe.msuite&hl=en&gl=US ===================================================
Company Details
psafeus
2
0
5415
psafe.com
0
PSA_3051448
In-progress
Between 650 and 699

PSafe US Global Score (TPRM)XXXX

Description: **New Android Ransomware Campaign Targets Spanish-Speaking Users with DroidLock Malware** Researchers have uncovered an active threat campaign distributing **DroidLock**, a sophisticated Android ransomware strain that hijacks devices and demands payment under threats of data destruction. While the campaign has primarily targeted **Spanish-speaking users**, experts warn it could expand to other regions. **How DroidLock Infects Devices** The malware spreads via **phishing sites** that impersonate trusted brands, such as telecom providers, tricking victims into downloading a malicious app. Once installed, the app acts as a **dropper**, exploiting **Device Admin and Accessibility Services permissions** to gain full control. After securing accessibility access, DroidLock autonomously approves additional permissions—including **SMS, call logs, contacts, and audio**—to strengthen its leverage for extortion. **Capabilities and Attack Tactics** DroidLock employs **Accessibility Services** to overlay fake screens, such as a fraudulent Android update prompt, while secretly capturing **device unlock patterns** and app credentials. Using **Virtual Network Computing (VNC)**, attackers gain **real-time remote control**, enabling them to: - **Change device PINs** to lock users out - **Intercept one-time passwords (OTPs)** - **Manipulate notifications, mute audio, or uninstall apps** - **Activate the camera** for surveillance - **Wipe the device** if ransom demands aren’t met Unlike traditional ransomware, DroidLock **does not encrypt files** but instead **blocks access** and threatens permanent data deletion unless payment is made within **24 hours**. Victims receive a ransom note with an email contact and device ID, accompanied by countdown timers and warnings against involving authorities or recovery tools. **Researchers’ Findings** Security firm **Zimperium** highlighted the malware’s ability to **bypass security measures** and escalate privileges rapidly. The campaign’s success in Spain may prompt its expansion to other markets, raising concerns about its potential global reach.


PSafe US has 38.89% more incidents than the average of same-industry companies with at least one recorded incident.
PSafe US has 29.87% more incidents than the average of all companies with at least one recorded incident.
PSafe US reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
PSafe US cyber incidents detection timeline including parent company and subsidiaries

PSafe Technology is a leader in cybersecurity solutions. We develop products and services to shield devices and data from online dangers like malware, viruses, and ever-evolving security weaknesses. With experience and reputation, the company keeps your systems and information safe. Our mobile product is dfndr security, focused on Android users. It safeguards your phone against malware, phishing scams, and identity theft with the most relevant security features. PSafe's apps use artificial intelligence and machine learning to protect what's most important to you. Beyond mobile security. PSafe's innovative applications provide valuable insights to strengthen your overall security posture. =================================================== Dfndr security https://play.google.com/store/apps/details?id=com.psafe.msuite&hl=en&gl=US ===================================================


A AeC é apontada consistentemente como a líder brasileira na entrega de soluções de experiência do cliente e gestão de processos terceirizados. Servindo as principais marcas do mercado nacional, conquistou nos três últimos anos a posição de Empresa do Ano de BPO pela conceituada Frost and Sullivan

UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to op

LexisNexis Legal & Professional is a leading global provider of legal, regulatory and business information and analytics that help customers increase productivity, improve decision-making and outcomes, and advance the rule of law around the world. We help lawyers win cases, manage their work more e

We Transform. SAP® solutions into Value We understand the business of our clients and know what it takes to transform it into the future. At NTT DATA Business Solutions, we drive innovation – from advisory and implementation to managed services and beyond. With SAP at our core and a powerful ecosys

GDIT is a global technology and professional services company that delivers solutions, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solut
Insights you can act on to achieve trusted outcomes. We are insights-driven and outcomes-focused to help accelerate returns on your investments. Across 21 industry sectors and 400 locations worldwide, we provide comprehensive, scalable and sustainable IT and business consulting services that are in

Inetum is a European leader in digital services. Inetum’s team of 27,000 consultants and specialists strive every day to make a digital impact for businesses, public sector entities and society. Inetum’s solutions aim at contributing to its clients’ performance and innovation as well as the common g

We bring together the right people, the right technology and the right partners to create innovative solutions that make positive impact and address some of the most urgent and complex challenges facing the modern world. With a focus on serving governments globally, Serco’s services span justice,
Coforge is a global digital services and solutions provider, that leverages emerging technologies and deep domain expertise to deliver real-world business impact for its clients. A focus on select industries, a deep domain understanding of the underlying processes of those industries and partners
.png)
The Federal Bureau of Investigation has warned that Chinese hackers have compromised the safety management software (SMS) systems that send text messages...
Are Chinese hackers spying on your text messages? Last week, ABC News reported a global cybersecurity attack occurred this summer in which...
Build your own branded cybersecurity product with Bitdefender Antimalware Rebranding Solutions. Private Label or White Label integrations are now easier...
A new study reveals that a concerning number of Chrome users have installed browser extensions containing malware. Here's Google's advice on...
We recently had the pleasure of interviewing PSafe's CEO Marco DeMello. We asked him about his company's dfndr security application and enterprise.
Let's start with the basics of “cyber hygiene,” easy and common-sense ways to protect yourself online.
Cybersecurity Awareness Month couldn't have kicked off in more dramatic fashion: Facebook, WhatsApp, and Instagram went offline,...
Recent research from cybersecurity provider PSafe indicates that dating site and app users are still falling for simple scams that download...
For Marco Demello, CEO of mobile app security company PSafe, cybersecurity is a way of life. Demello spoke with Chief Executive about the...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of PSafe US is http://www.psafe.com.
According to Rankiteo, PSafe US’s AI-generated cybersecurity score is 696, reflecting their Weak security posture.
According to Rankiteo, PSafe US currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, PSafe US is not certified under SOC 2 Type 1.
According to Rankiteo, PSafe US does not hold a SOC 2 Type 2 certification.
According to Rankiteo, PSafe US is not listed as GDPR compliant.
According to Rankiteo, PSafe US does not currently maintain PCI DSS compliance.
According to Rankiteo, PSafe US is not compliant with HIPAA regulations.
According to Rankiteo,PSafe US is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
PSafe US operates primarily in the IT Services and IT Consulting industry.
PSafe US employs approximately 2 people worldwide.
PSafe US presently has no subsidiaries across any sectors.
PSafe US’s official LinkedIn profile has approximately 0 followers.
PSafe US is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
No, PSafe US does not have a profile on Crunchbase.
Yes, PSafe US maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/psafeus.
As of December 12, 2025, Rankiteo reports that PSafe US has experienced 1 cybersecurity incidents.
PSafe US has an estimated 37,613 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with uninstall malicious app, use anti-malware solutions (e.g., malwarebytes for android), reset device pin..
Title: DroidLock Android Ransomware Campaign
Description: Researchers have analyzed a new threat campaign actively targeting Android users with malware named DroidLock. The malware takes over a device and holds it for ransom by abusing Device Admin and Accessibility Services permissions. The campaign primarily targets Spanish-speaking users but could spread globally.
Type: Ransomware
Attack Vector: Phishing (malicious app installation via fake telecom provider or brand impersonation)
Vulnerability Exploited: Abuse of Device Admin and Accessibility Services permissions
Motivation: Financial gain (ransom)
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing sites impersonating telecom providers or brands.

Data Compromised: SMS, call logs, contacts, audio, device unlock patterns, app credentials, OTPs
Systems Affected: Android devices
Operational Impact: Device lockout, remote control by attackers, potential data destruction
Identity Theft Risk: High (OTP interception, credential theft)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are SMS, call logs, contacts, audio, device unlock patterns, app credentials and OTPs.

Entity Type: Individual users
Location: Primarily Spanish-speaking regions (potential global spread)

Remediation Measures: Uninstall malicious app, use anti-malware solutions (e.g., Malwarebytes for Android), reset device PIN

Type of Data Compromised: SMS, call logs, contacts, audio, device unlock patterns, app credentials, OTPs
Sensitivity of Data: High (personally identifiable information, authentication data)
Data Exfiltration: Possible (via remote control and VNC)
Data Encryption: No (files not encrypted, but device access is blocked)
Personally Identifiable Information: Yes (contacts, SMS, call logs, credentials, OTPs)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Uninstall malicious app, use anti-malware solutions (e.g., Malwarebytes for Android), reset device PIN.

Ransom Demanded: Yes (amount not specified)
Ransomware Strain: DroidLock
Data Encryption: No
Data Exfiltration: Possible (via remote control)

Lessons Learned: Android users should avoid sideloading apps, scrutinize permissions (especially Accessibility Services), and use real-time anti-malware solutions. Keeping devices updated is critical to prevent exploitation of known vulnerabilities.

Recommendations: Only install apps from official app stores (Google Play)., Avoid installing apps promoted via SMS, email, or messaging apps., Verify developer names, download counts, and user reviews before installing apps., Use up-to-date anti-malware solutions (e.g., Malwarebytes for Android)., Scrutinize app permissions, especially for Accessibility Services, SMS, or camera access., Keep Android, Google Play services, and apps updated for security fixes.Only install apps from official app stores (Google Play)., Avoid installing apps promoted via SMS, email, or messaging apps., Verify developer names, download counts, and user reviews before installing apps., Use up-to-date anti-malware solutions (e.g., Malwarebytes for Android)., Scrutinize app permissions, especially for Accessibility Services, SMS, or camera access., Keep Android, Google Play services, and apps updated for security fixes.Only install apps from official app stores (Google Play)., Avoid installing apps promoted via SMS, email, or messaging apps., Verify developer names, download counts, and user reviews before installing apps., Use up-to-date anti-malware solutions (e.g., Malwarebytes for Android)., Scrutinize app permissions, especially for Accessibility Services, SMS, or camera access., Keep Android, Google Play services, and apps updated for security fixes.Only install apps from official app stores (Google Play)., Avoid installing apps promoted via SMS, email, or messaging apps., Verify developer names, download counts, and user reviews before installing apps., Use up-to-date anti-malware solutions (e.g., Malwarebytes for Android)., Scrutinize app permissions, especially for Accessibility Services, SMS, or camera access., Keep Android, Google Play services, and apps updated for security fixes.Only install apps from official app stores (Google Play)., Avoid installing apps promoted via SMS, email, or messaging apps., Verify developer names, download counts, and user reviews before installing apps., Use up-to-date anti-malware solutions (e.g., Malwarebytes for Android)., Scrutinize app permissions, especially for Accessibility Services, SMS, or camera access., Keep Android, Google Play services, and apps updated for security fixes.Only install apps from official app stores (Google Play)., Avoid installing apps promoted via SMS, email, or messaging apps., Verify developer names, download counts, and user reviews before installing apps., Use up-to-date anti-malware solutions (e.g., Malwarebytes for Android)., Scrutinize app permissions, especially for Accessibility Services, SMS, or camera access., Keep Android, Google Play services, and apps updated for security fixes.
Key Lessons Learned: The key lessons learned from past incidents are Android users should avoid sideloading apps, scrutinize permissions (especially Accessibility Services), and use real-time anti-malware solutions. Keeping devices updated is critical to prevent exploitation of known vulnerabilities.

Source: Zimperium
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Zimperium.

Investigation Status: Ongoing (researchers actively analyzing the campaign)

Customer Advisories: Users are advised to avoid sideloading apps, verify app legitimacy, and use anti-malware tools. If infected, victims should contact security experts and avoid paying the ransom.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Users are advised to avoid sideloading apps, verify app legitimacy, and use anti-malware tools. If infected and victims should contact security experts and avoid paying the ransom..

Entry Point: Phishing sites impersonating telecom providers or brands
Backdoors Established: Device Admin and Accessibility Services abuse

Root Causes: Abuse of Android permissions (Device Admin and Accessibility Services), lack of user awareness about sideloading risks, and delayed security updates.
Corrective Actions: Enhanced permission controls for Accessibility Services, stricter app store vetting, user education on phishing and sideloading risks, and real-time anti-malware adoption.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enhanced permission controls for Accessibility Services, stricter app store vetting, user education on phishing and sideloading risks, and real-time anti-malware adoption..
Last Ransom Demanded: The amount of the last ransom demanded was Yes (amount not specified).
Most Significant Data Compromised: The most significant data compromised in an incident were SMS, call logs, contacts, audio, device unlock patterns, app credentials and OTPs.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were SMS, call logs, contacts, audio, device unlock patterns, app credentials and OTPs.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was Yes (amount not specified).
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Android users should avoid sideloading apps, scrutinize permissions (especially Accessibility Services), and use real-time anti-malware solutions. Keeping devices updated is critical to prevent exploitation of known vulnerabilities.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Avoid installing apps promoted via SMS, email, or messaging apps., Only install apps from official app stores (Google Play)., Scrutinize app permissions, especially for Accessibility Services, SMS, or camera access., Verify developer names, download counts, and user reviews before installing apps., Keep Android, Google Play services, and apps updated for security fixes., Use up-to-date anti-malware solutions (e.g. and Malwarebytes for Android)..
Most Recent Source: The most recent source of information about an incident is Zimperium.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (researchers actively analyzing the campaign).
Most Recent Customer Advisory: The most recent customer advisory issued were an Users are advised to avoid sideloading apps, verify app legitimacy, and use anti-malware tools. If infected and victims should contact security experts and avoid paying the ransom.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Phishing sites impersonating telecom providers or brands.
.png)
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, there is no handler for JSON parsing errors; SyntaxError from express.json() includes user input in the error message, which gets reflected in responses. User input (including HTML/JavaScript) can be exposed in error responses, creating an XSS risk if Content-Type isn't strictly enforced. This issue does not have a fix at the time of publication.
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when creating prompts, JSON requests are sent to define and modify the prompts via PATCH endpoint for prompt groups (/api/prompts/groups/:groupId). However, the request bodies are not sufficiently validated for proper input, enabling users to modify prompts in a way that was not intended as part of the front end system. The patchPromptGroup function passes req.body directly to updatePromptGroup() without filtering sensitive fields. This issue is fixed in version 0.8.1.
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The malicious code is then stored in the chat which can then be shared to other users. When sharing chats with a potentially malicious “tracker”, resources loaded can lead to loss of privacy for users who view the chat link that is sent to them. This issue is fixed in version 0.8.1.
MaxKB is an open-source AI assistant for enterprise. Versions 2.3.1 and below have improper file permissions which allow attackers to overwrite the built-in dynamic linker and other critical files, potentially resulting in privilege escalation. This issue is fixed in version 2.4.0.
MaxKB is an open-source AI assistant for enterprise. In versions 2.3.1 and below, the tool module allows an attacker to escape the sandbox environment and escalate privileges under certain concurrent conditions. This issue is fixed in version 2.4.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.