Realistic illustration of a computer screen showing the VanHelsing ransomware attack targeting multiple operating systems, suitable for a cybersecurity news article.
Immagine generata dall'IA

VanHelsing ransomware RaaS targets multiple platforms

Immagine generata dall'IA

A new ransomware-as-a-service operation called VanHelsing emerged on March 7, 2025, quickly claiming at least three victims. It supports attacks on Windows, Linux, BSD, ARM, and ESXi systems, with affiliates retaining 80% of ransoms after a $5,000 deposit. The group prohibits targeting entities in the Commonwealth of Independent States.

VanHelsing represents a sophisticated evolution in ransomware deployment, first observed on March 7, 2025. Operating as a Ransomware-as-a-Service (RaaS) platform, it lowers barriers for affiliates by requiring only a $5,000 deposit for access to its tools and infrastructure. Affiliates keep 80% of collected ransoms, fostering rapid scaling and widespread attacks.

The operation's broad compatibility sets it apart, targeting Windows, Linux, BSD, ARM architectures, and ESXi virtualization environments. This multi-platform support expands the potential victim base significantly beyond typical Windows-focused threats. Within two weeks of its debut, VanHelsing claimed at least three successful breaches, with ransom negotiations reaching $500,000 in one case.

Technically, the ransomware is a C++ binary designed for flexibility and resilience. It creates a mutex named “Global\VanHelsing” to avoid concurrent executions, bypassable via the –Force parameter. Process priority is set high for faster encryption, adjustable with –no-priority for stealth. Encryption uses unique random keys and nonces per file, secured with ChaCha20 stream cipher and an embedded Curve25519 public key, ensuring decryption requires the operators' private key.

For efficiency, large files—such as those over 1 GB or database assets—are encrypted only to 30%, processed in 1 MB chunks. The –Silent mode splits operations into phases: encryption first, then renaming files with .vanhelsing extension, reducing detection risks from endpoint security tools.

Lateral movement enhances its threat, scanning SMB servers, enumerating shares (avoiding critical ones like NETLOGON and sysvol), and using bundled psexec.exe for remote execution. It deletes Windows Volume Shadow Copies via WMI queries to hinder recovery. Two variants, compiled five days apart, indicate ongoing development based on feedback and defensive responses.

Mitigation emphasizes offline backups, network segmentation, and monitoring for behaviors like shadow copy deletion and anomalous SMB traffic.

Cosa dice la gente

X discussions focus on the rapid emergence of VanHelsing ransomware-as-a-service in March 2025, its cross-platform targeting of Windows, Linux, BSD, ARM, and ESXi systems, claims of early victims including a Texas city and tech firms, and a major source code leak in May 2025 following an internal dispute, raising concerns about the operation's stability and potential for new variants. Reactions are predominantly neutral and informative from cybersecurity experts and news accounts, with alerts emphasizing the need for enhanced defenses against its double-extortion tactics.

Articoli correlati

Illustration of a hacking forum ad for The Gentlemen's RaaS ransomware service, depicting a dark web cyber threat environment.
Immagine generata dall'IA

New gentlemen's raas advertised on underground forums

Riportato dall'IA Immagine generata dall'IA

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

The pro-Russia hacktivist group CyberVolk has reemerged with a new ransomware-as-a-service platform called VolkLocker, supporting both Linux and Windows systems. First documented in 2024 by SentinelOne, the group returned after a period of inactivity caused by Telegram bans. Despite advanced automation via Telegram bots, the malware features significant encryption flaws that could allow victims to recover files without payment.

Riportato dall'IA

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

Cisco Talos has reported a China-linked threat actor known as UAT-7290 that has been spying on telecommunications companies since 2022. The group uses Linux malware, exploits on edge devices, and ORB infrastructure to maintain access to targeted networks.

Riportato dall'IA

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

Riportato dall'IA

In 2025, cyber threats in the Philippines stuck to traditional methods like phishing and ransomware, without new forms emerging. However, artificial intelligence amplified the volume and scale of these attacks, leading to an 'industrialization of cybercrime'. Reports from various cybersecurity firms highlight increases in speed, scale, and frequency of incidents.

 

 

 

Questo sito web utilizza i cookie

Utilizziamo i cookie per l'analisi per migliorare il nostro sito. Leggi la nostra politica sulla privacy per ulteriori informazioni.
Rifiuta