vanhelsing ransomware targets windows esxi

A brand-new ransomware threat has emerged from the shadows, and it’s not messing around. The VanHelsing ransomware-as-a-service (RaaS) operation launched March 7, 2025, and has already infected three victims in just two weeks. Talk about hitting the ground running.

This Russian cybercrime project requires new affiliates to cough up a $5,000 deposit. But hey, they get to keep 80% of ransom payments, which is pretty generous in the criminal underworld. The remaining 20% goes to the operators. Like most Russian malware, VanHelsing prohibits attacks on Commonwealth of Independent States countries. No surprise there.

The technical aspects are actually impressive. Written in C++, this ransomware targets Windows, Linux, BSD, ARM, and ESXi systems. It uses ChaCha20 and Curve25519 for encryption, slapping files with the .vanhelsing extension. Smart enough to avoid critical system files, it only encrypts the first 30% of large files to speed things up. Efficient criminals, these ones.

VanHelsing has set its sights on government sectors in the US and France, manufacturing industries, and pharmaceutical companies. Word is they’re eyeing finance and healthcare next. Current victims include two US tech companies and a Texas city, with ransom demands reaching a cool $500,000 in Bitcoin. The ransomware employs a double extortion strategy that includes both encrypting files and stealing sensitive data to maximize leverage against victims. Similar to other infostealer trojans, VanHelsing’s infections can lead to costly downtime exceeding $10,000 per hour for affected businesses.

The “Silent Mode” feature is particularly sneaky. It separates encryption from file renaming to avoid detection by security tools. The ransomware also deletes shadow copies using WMI and can spread through networks via SMB, packing an embedded PsExec.exe. Neat trick.

After infection, victims get the standard treatment: README.txt ransom notes, a changed desktop wallpaper with the RaaS logo, and threats of data leaks if they don’t pay up. Communication happens through a Tor-based chat portal, because privacy matters to criminals too, apparently. Similar to other threat actors, VanHelsing is known to exploit the authentication bypass flaw in VMware ESXi to gain administrative privileges.

With its advanced features and growing sophistication, VanHelsing marks yet another evolution in ransomware tactics. Great. Just what we needed.

You May Also Like

Revolutionary Akira Ransomware Decryptor Harnesses GPU Power to Defeat Complex Encryptions

Revolutionary Akira ransomware decryptor smashes crypto barriers using 16 RTX 4090 GPUs. Brute-forcing 1,500 rounds of SHA-256 hashing in just 10 hours, this $1,200 creation exploits timestamp vulnerabilities while cybercriminals scramble to respond.

Spearwing Raas Group Escalates Cyber Warfare With Medusa Ransomware Surge

Russian hackers expand their criminal empire while competitors falter. Spearwing’s Medusa ransomware quietly doubled attacks in 2025, demanding up to $15 million from victims. Your organization could be next.

RansomHouse Gang Exposes Loretto Hospital’s Vulnerabilities in Bold Cyber Assault

Chicago’s Loretto Hospital falls prey to RansomHouse’s surgical cyber assault—exposing 1.5TB of patient data without encrypting a single file. This $5 million nightmare reveals why healthcare institutions have become cybercriminals’ favorite targets.

Chaos Unleashed: Ransomware Paralyses Health Services in the FSM

Tiny island, catastrophic impact: Ransomware attack paralyzes healthcare in FSM, forcing doctors back to paper records. Patient lives hang in the balance as recovery efforts struggle.