Realistic illustration of a computer screen showing the VanHelsing ransomware attack targeting multiple operating systems, suitable for a cybersecurity news article.
Picha iliyoundwa na AI

VanHelsing ransomware RaaS targets multiple platforms

Picha iliyoundwa na AI

A new ransomware-as-a-service operation called VanHelsing emerged on March 7, 2025, quickly claiming at least three victims. It supports attacks on Windows, Linux, BSD, ARM, and ESXi systems, with affiliates retaining 80% of ransoms after a $5,000 deposit. The group prohibits targeting entities in the Commonwealth of Independent States.

VanHelsing represents a sophisticated evolution in ransomware deployment, first observed on March 7, 2025. Operating as a Ransomware-as-a-Service (RaaS) platform, it lowers barriers for affiliates by requiring only a $5,000 deposit for access to its tools and infrastructure. Affiliates keep 80% of collected ransoms, fostering rapid scaling and widespread attacks.

The operation's broad compatibility sets it apart, targeting Windows, Linux, BSD, ARM architectures, and ESXi virtualization environments. This multi-platform support expands the potential victim base significantly beyond typical Windows-focused threats. Within two weeks of its debut, VanHelsing claimed at least three successful breaches, with ransom negotiations reaching $500,000 in one case.

Technically, the ransomware is a C++ binary designed for flexibility and resilience. It creates a mutex named “Global\VanHelsing” to avoid concurrent executions, bypassable via the –Force parameter. Process priority is set high for faster encryption, adjustable with –no-priority for stealth. Encryption uses unique random keys and nonces per file, secured with ChaCha20 stream cipher and an embedded Curve25519 public key, ensuring decryption requires the operators' private key.

For efficiency, large files—such as those over 1 GB or database assets—are encrypted only to 30%, processed in 1 MB chunks. The –Silent mode splits operations into phases: encryption first, then renaming files with .vanhelsing extension, reducing detection risks from endpoint security tools.

Lateral movement enhances its threat, scanning SMB servers, enumerating shares (avoiding critical ones like NETLOGON and sysvol), and using bundled psexec.exe for remote execution. It deletes Windows Volume Shadow Copies via WMI queries to hinder recovery. Two variants, compiled five days apart, indicate ongoing development based on feedback and defensive responses.

Mitigation emphasizes offline backups, network segmentation, and monitoring for behaviors like shadow copy deletion and anomalous SMB traffic.

Watu wanasema nini

X discussions focus on the rapid emergence of VanHelsing ransomware-as-a-service in March 2025, its cross-platform targeting of Windows, Linux, BSD, ARM, and ESXi systems, claims of early victims including a Texas city and tech firms, and a major source code leak in May 2025 following an internal dispute, raising concerns about the operation's stability and potential for new variants. Reactions are predominantly neutral and informative from cybersecurity experts and news accounts, with alerts emphasizing the need for enhanced defenses against its double-extortion tactics.

Makala yanayohusiana

Illustration of a hacking forum ad for The Gentlemen's RaaS ransomware service, depicting a dark web cyber threat environment.
Picha iliyoundwa na AI

New gentlemen's raas advertised on underground forums

Imeripotiwa na AI Picha iliyoundwa na AI

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

The pro-Russia hacktivist group CyberVolk has reemerged with a new ransomware-as-a-service platform called VolkLocker, supporting both Linux and Windows systems. First documented in 2024 by SentinelOne, the group returned after a period of inactivity caused by Telegram bans. Despite advanced automation via Telegram bots, the malware features significant encryption flaws that could allow victims to recover files without payment.

Imeripotiwa na AI

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

Cisco Talos has reported a China-linked threat actor known as UAT-7290 that has been spying on telecommunications companies since 2022. The group uses Linux malware, exploits on edge devices, and ORB infrastructure to maintain access to targeted networks.

Imeripotiwa na AI

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

Imeripotiwa na AI

In 2025, cyber threats in the Philippines stuck to traditional methods like phishing and ransomware, without new forms emerging. However, artificial intelligence amplified the volume and scale of these attacks, leading to an 'industrialization of cybercrime'. Reports from various cybersecurity firms highlight increases in speed, scale, and frequency of incidents.

Ijumaa, 30. Mwezi wa kwanza 2026, 21:23:53

Researchers uncover ShadowHS Linux exploitation framework

Jumatano, 7. Mwezi wa kwanza 2026, 09:35:24

Gobruteforcer botnet targets Linux servers worldwide

Jumatano, 31. Mwezi wa kumi na mbili 2025, 02:53:37

US cybersecurity professionals plead guilty to blackcat ransomware attacks

Jumanne, 16. Mwezi wa kumi na mbili 2025, 23:12:04

React2Shell exploits continue with large-scale Linux backdoor deployments and cloud credential theft

Jumapili, 14. Mwezi wa kumi na mbili 2025, 05:21:23

Update: Spanish Police Dismantle Transnational Crypto 'Wrench Attack' Ring

Jumamosi, 13. Mwezi wa kumi na mbili 2025, 18:43:35

CyberVolk's VolkLocker hampered by plaintext master key flaw

Jumamosi, 13. Mwezi wa kumi na mbili 2025, 02:22:17

Rust-based Luca stealer targets Linux and Windows systems

Ijumaa, 12. Mwezi wa kumi na mbili 2025, 08:50:00

Russian cybercriminals release new ransomware

Jumatano, 10. Mwezi wa kumi na mbili 2025, 15:36:03

React2Shell flaw exploited for PeerBlight malware on Linux

Jumatano, 5. Mwezi wa kumi na moja 2025, 22:25:46

Russian hackers use Linux VMs to hide malware on Windows

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa