ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

PSafe Technology is a leader in cybersecurity solutions. We develop products and services to shield devices and data from online dangers like malware, viruses, and ever-evolving security weaknesses. With experience and reputation, the company keeps your systems and information safe. Our mobile product is dfndr security, focused on Android users. It safeguards your phone against malware, phishing scams, and identity theft with the most relevant security features. PSafe's apps use artificial intelligence and machine learning to protect what's most important to you. Beyond mobile security. PSafe's innovative applications provide valuable insights to strengthen your overall security posture. =================================================== Dfndr security https://play.google.com/store/apps/details?id=com.psafe.msuite&hl=en&gl=US ===================================================

PSafe US A.I CyberSecurity Scoring

PSafe US

Company Details

Linkedin ID:

psafeus

Employees number:

2

Number of followers:

0

NAICS:

5415

Industry Type:

IT Services and IT Consulting

Homepage:

psafe.com

IP Addresses:

Scan still pending

Company ID:

PSA_3051448

Scan Status:

In-progress

AI scorePSafe US Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/psafeus.jpeg
PSafe US IT Services and IT Consulting
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscorePSafe US Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/psafeus.jpeg
PSafe US IT Services and IT Consulting
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

PSafe US

Weak
Current Score
696
B (Weak)
01000
1 incidents
-90.0 avg impact

Incident timeline with MITRE ATT&CK tactics, techniques, and mitigations.

DECEMBER 2025
786
Ransomware
11 Dec 2025 • PSafe US: DroidLock malware locks you out of your Android device and demands ransom
DroidLock Android Ransomware Campaign

**New Android Ransomware Campaign Targets Spanish-Speaking Users with DroidLock Malware** Researchers have uncovered an active threat campaign distributing **DroidLock**, a sophisticated Android ransomware strain that hijacks devices and demands payment under threats of data destruction. While the campaign has primarily targeted **Spanish-speaking users**, experts warn it could expand to other regions. **How DroidLock Infects Devices** The malware spreads via **phishing sites** that impersonate trusted brands, such as telecom providers, tricking victims into downloading a malicious app. Once installed, the app acts as a **dropper**, exploiting **Device Admin and Accessibility Services permissions** to gain full control. After securing accessibility access, DroidLock autonomously approves additional permissions—including **SMS, call logs, contacts, and audio**—to strengthen its leverage for extortion. **Capabilities and Attack Tactics** DroidLock employs **Accessibility Services** to overlay fake screens, such as a fraudulent Android update prompt, while secretly capturing **device unlock patterns** and app credentials. Using **Virtual Network Computing (VNC)**, attackers gain **real-time remote control**, enabling them to: - **Change device PINs** to lock users out - **Intercept one-time passwords (OTPs)** - **Manipulate notifications, mute audio, or uninstall apps** - **Activate the camera** for surveillance - **Wipe the device** if ransom demands aren’t met Unlike traditional ransomware, DroidLock **does not encrypt files** but instead **blocks access** and threatens permanent data deletion unless payment is made within **24 hours**. Victims receive a ransom note with an email contact and device ID, accompanied by countdown timers and warnings against involving authorities or recovery tools. **Researchers’ Findings** Security firm **Zimperium** highlighted the malware’s ability to **bypass security measures** and escalate privileges rapidly. The campaign’s success in Spain may prompt its expansion to other markets, raising concerns about its potential global reach.

696
critical -90
PSA1765476395
Ransomware
Phishing (malicious app installation via fake telecom provider or brand impersonation)
Abuse of Device Admin and Accessibility Services permissions
Financial gain (ransom)
Data Compromised: SMS, call logs, contacts, audio, device unlock patterns, app credentials, OTPs Systems Affected: Android devices Operational Impact: Device lockout, remote control by attackers, potential data destruction Identity Theft Risk: High (OTP interception, credential theft)
Remediation Measures: Uninstall malicious app, use anti-malware solutions (e.g., Malwarebytes for Android), reset device PIN
Type Of Data Compromised: SMS, call logs, contacts, audio, device unlock patterns, app credentials, OTPs Sensitivity Of Data: High (personally identifiable information, authentication data) Data Exfiltration: Possible (via remote control and VNC) Data Encryption: No (files not encrypted, but device access is blocked) Personally Identifiable Information: Yes (contacts, SMS, call logs, credentials, OTPs)
Android users should avoid sideloading apps, scrutinize permissions (especially Accessibility Services), and use real-time anti-malware solutions. Keeping devices updated is critical to prevent exploitation of known vulnerabilities.
Only install apps from official app stores (Google Play). Avoid installing apps promoted via SMS, email, or messaging apps. Verify developer names, download counts, and user reviews before installing apps. Use up-to-date anti-malware solutions (e.g., Malwarebytes for Android). Scrutinize app permissions, especially for Accessibility Services, SMS, or camera access. Keep Android, Google Play services, and apps updated for security fixes.
Ongoing (researchers actively analyzing the campaign)
Users are advised to avoid sideloading apps, verify app legitimacy, and use anti-malware tools. If infected, victims should contact security experts and avoid paying the ransom.
Entry Point: Phishing sites impersonating telecom providers or brands Backdoors Established: Device Admin and Accessibility Services abuse
Root Causes: Abuse of Android permissions (Device Admin and Accessibility Services), lack of user awareness about sideloading risks, and delayed security updates. Corrective Actions: Enhanced permission controls for Accessibility Services, stricter app store vetting, user education on phishing and sideloading risks, and real-time anti-malware adoption.
NOVEMBER 2025
786
OCTOBER 2025
786
SEPTEMBER 2025
786
AUGUST 2025
786
JULY 2025
786
JUNE 2025
786
MAY 2025
786
APRIL 2025
786
MARCH 2025
786
FEBRUARY 2025
786
JANUARY 2025
786

Frequently Asked Questions

According to Rankiteo, the current A.I.-based Cyber Score for PSafe US is 696, which corresponds to a Weak rating.

According to Rankiteo, the A.I. Rankiteo Cyber Score for November 2025 was 786.

According to Rankiteo, the A.I. Rankiteo Cyber Score for October 2025 was 786.

According to Rankiteo, the A.I. Rankiteo Cyber Score for September 2025 was 786.

According to Rankiteo, the A.I. Rankiteo Cyber Score for August 2025 was 786.

According to Rankiteo, the A.I. Rankiteo Cyber Score for July 2025 was 786.

According to Rankiteo, the A.I. Rankiteo Cyber Score for June 2025 was 786.

According to Rankiteo, the A.I. Rankiteo Cyber Score for May 2025 was 786.

According to Rankiteo, the A.I. Rankiteo Cyber Score for April 2025 was 786.

According to Rankiteo, the A.I. Rankiteo Cyber Score for March 2025 was 786.

According to Rankiteo, the A.I. Rankiteo Cyber Score for February 2025 was 786.

According to Rankiteo, the A.I. Rankiteo Cyber Score for January 2025 was 786.

Over the past 12 months, the average per-incident point impact on PSafe US’s A.I Rankiteo Cyber Score has been -90.0 points.

You can access PSafe US’s cyber incident details on Rankiteo by visiting the following link: https://www.rankiteo.com/company/psafeus.

You can find the summary of the A.I Rankiteo Risk Scoring methodology on Rankiteo by visiting the following link: Rankiteo Algorithm.

You can view PSafe US’s profile page on Rankiteo by visiting the following link: https://www.rankiteo.com/company/psafeus.

With scores of 18.5/20 from OpenAI ChatGPT, 20/20 from Mistral AI, and 17/20 from Claude AI, the A.I. Rankiteo Risk Scoring methodology is validated as a market leader.