Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
New VanHelsing ransomware claims three victims within a month
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

New VanHelsing ransomware claims three victims within a month

Sophisticated affiliate program: VanHelsing is a refined ransomware written in C++ and, based on the compilation timestamp observed by Check Point, had claimed its first victim on the same day it got spotted by CYFIRMA.”The ransomware accepts multiple command-line arguments that control the encryption process, such as whether to encrypt network and local drives or specific directories and files,” Check Point added.Additionally, as per VanHelsing’s advertisement screenshot shared with the Check Point blog post, the RaaS offers other affiliate-friendly features including encryption control, encryption modes, self-propagation, and debugging.While new affiliates are required to pay a deposit of $5,000 to gain access to the program, experienced ones can join for free. “After two blockchain confirmations of the victim’s ransom payment, the affiliates receive 80% of the revenue, while the remaining 20% is paid to the RaaS operators,” CheckPoint added.To keep victims from restoring or recovering files, the RaaS is designed to delete all “Shadow Copies,” which are backup copies of files or volumes created by Windows Volume Shadow Copy Service (VSS).According to CYFIRMA, the ransomware has so far targeted Government, Manufacturing and Pharma companies in the US and France. It advises companies to implement robust encryption, authentication, and configuration practices, along with ensuring backups of critical systems and files.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3853628/new-vanhelsing-ransomware-claims-three-victims-within-a-month.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link