Realistic illustration of a computer screen showing the VanHelsing ransomware attack targeting multiple operating systems, suitable for a cybersecurity news article.
Realistic illustration of a computer screen showing the VanHelsing ransomware attack targeting multiple operating systems, suitable for a cybersecurity news article.
Image generated by AI

VanHelsing ransomware RaaS targets multiple platforms

Image generated by AI

A new ransomware-as-a-service operation called VanHelsing emerged on March 7, 2025, quickly claiming at least three victims. It supports attacks on Windows, Linux, BSD, ARM, and ESXi systems, with affiliates retaining 80% of ransoms after a $5,000 deposit. The group prohibits targeting entities in the Commonwealth of Independent States.

VanHelsing represents a sophisticated evolution in ransomware deployment, first observed on March 7, 2025. Operating as a Ransomware-as-a-Service (RaaS) platform, it lowers barriers for affiliates by requiring only a $5,000 deposit for access to its tools and infrastructure. Affiliates keep 80% of collected ransoms, fostering rapid scaling and widespread attacks.

The operation's broad compatibility sets it apart, targeting Windows, Linux, BSD, ARM architectures, and ESXi virtualization environments. This multi-platform support expands the potential victim base significantly beyond typical Windows-focused threats. Within two weeks of its debut, VanHelsing claimed at least three successful breaches, with ransom negotiations reaching $500,000 in one case.

Technically, the ransomware is a C++ binary designed for flexibility and resilience. It creates a mutex named “Global\VanHelsing” to avoid concurrent executions, bypassable via the –Force parameter. Process priority is set high for faster encryption, adjustable with –no-priority for stealth. Encryption uses unique random keys and nonces per file, secured with ChaCha20 stream cipher and an embedded Curve25519 public key, ensuring decryption requires the operators' private key.

For efficiency, large files—such as those over 1 GB or database assets—are encrypted only to 30%, processed in 1 MB chunks. The –Silent mode splits operations into phases: encryption first, then renaming files with .vanhelsing extension, reducing detection risks from endpoint security tools.

Lateral movement enhances its threat, scanning SMB servers, enumerating shares (avoiding critical ones like NETLOGON and sysvol), and using bundled psexec.exe for remote execution. It deletes Windows Volume Shadow Copies via WMI queries to hinder recovery. Two variants, compiled five days apart, indicate ongoing development based on feedback and defensive responses.

Mitigation emphasizes offline backups, network segmentation, and monitoring for behaviors like shadow copy deletion and anomalous SMB traffic.

What people are saying

X discussions focus on the rapid emergence of VanHelsing ransomware-as-a-service in March 2025, its cross-platform targeting of Windows, Linux, BSD, ARM, and ESXi systems, claims of early victims including a Texas city and tech firms, and a major source code leak in May 2025 following an internal dispute, raising concerns about the operation's stability and potential for new variants. Reactions are predominantly neutral and informative from cybersecurity experts and news accounts, with alerts emphasizing the need for enhanced defenses against its double-extortion tactics.

Related Articles

Dramatic illustration of Stryker's operations center disrupted by Iran-linked cyberattack, with error-filled screens and intact medical devices.
Image generated by AI

Iran-linked hackers disrupt Stryker's network in apparent retaliation

Reported by AI Image generated by AI

A cyberattack attributed to the Iran-aligned Handala Hack group has disrupted the Microsoft environment of medical device maker Stryker, paralyzing much of its global operations. The incident, which emerged shortly after US and Israeli airstrikes on Iran, involved data wiping across tens of thousands of computers. Stryker confirmed the attack is contained, with no impact on its critical medical devices.

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

Reported by AI

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

The Hacker News has released its latest ThreatsDay Bulletin, focusing on various cybersecurity issues. The bulletin covers topics such as Kali Linux combined with Claude, Chrome crash traps, WinRAR flaws, and activities related to LockBit. It also includes over 15 additional stories on emerging threats.

Reported by AI

Nineteen malicious packages on the npm registry are spreading a worm known as SANDWORM_MODE. These packages steal crypto keys, CI secrets, API tokens, and AI API keys. The theft occurs through MCP injection.

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline