Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

VanHelsing Ransomware Targets Gov Sectors

March 21, 2025
Reading Time: 2 mins read
in Alerts
Cisco Flaws Actively Targeted by Hackers

A new ransomware strain named VanHelsing was first observed on March 16, 2025, targeting Windows systems. Its primary focus is on government, manufacturing, and pharmaceutical sectors in France and the United States. Once a system is infected, VanHelsing encrypts files and appends the “.vanhelsing” extension to compromised files. The ransomware also changes the desktop wallpaper and places a ransom note called “README.txt” to communicate with victims.

VanHelsing operates using a double extortion strategy.

In addition to encrypting files, it exfiltrates sensitive data, including personal details, financial reports, and other critical documents. This strategy increases the pressure on victims to pay the demanded Bitcoin ransom. The ransomware also employs advanced evasion techniques to avoid detection, including Windows Management Instrumentation, scheduled tasks, and command scripting for execution.

The malware uses several methods to maintain persistence, such as registry run keys, Windows services, and bootkit capabilities. It modifies system registry settings, manipulates file permissions, and executes indirect commands. These tactics ensure that VanHelsing can continue running even after system reboots or attempts to remove the malware.

The ransomware also features a branded desktop wallpaper, warning victims that their system has been compromised.

VanHelsing operates a dedicated chat portal on the Tor network for victims to communicate with attackers. It also extends its capabilities to credential theft, system discovery, and data collection from local systems and email repositories. Security experts recommend implementing backup solutions, multifactor authentication, regular patching, and zero-trust architecture to mitigate risks from this new ransomware strain.

Reference:
  • New VanHelsing Ransomware Targets Gov and Pharma Sectors in France and US
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMarch 2025
ADVERTISEMENT

Related Posts

MixShell Hts US Supply Chain Firms

MixShell Hts US Supply Chain Firms

August 27, 2025
MixShell Hts US Supply Chain Firms

AI Attack Hides Prompts In Images

August 27, 2025
MixShell Hts US Supply Chain Firms

WhatsApp Desktop Code Execution Risk

August 27, 2025
Fake CoinMarketCap Journalists Scam

Fake CoinMarketCap Journalists Scam

August 26, 2025
Fake CoinMarketCap Journalists Scam

Malicious Apps Removed from Google Play

August 26, 2025
Fake CoinMarketCap Journalists Scam

AI Browsers Pose Prompt Injection Risk

August 26, 2025

Latest Alerts

MixShell Hts US Supply Chain Firms

AI Attack Hides Prompts In Images

WhatsApp Desktop Code Execution Risk

Malicious Apps Removed from Google Play

Fake CoinMarketCap Journalists Scam

AI Browsers Pose Prompt Injection Risk

Subscribe to our newsletter

    Latest Incidents

    Auchan Retailer Reports Data Breach

    NJ Social Services Reports Data Breach

    Salesloft Breach Exposes OAuth Tokens

    Farmers Insurance Cyberattack Hits 1M

    Arch Linux Hit by Ongoing DDoS Attack

    Hackers Disrupt Iran Merchant Fleet Again

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial