A New Digital Predator: VanHelsing Ransomware steps into the spotlight

May 14, 2025

In the shadowy depths of cyber underworld, a new predator has emerged: one that is silent, swift and already making waves across global networks. VanHelsing RaaS, a recently launched ransomware-as-a-service platform, is proving that even newcomers can shake the very foundations of cybersecurity. Debuting in March 2025, this operation wasted no time, within two weeks, it had claimed its first three victims and rolled out more sophisticated variant, signaling not just ambition, but capability. With a lucrative affiliate model, cross-platform reach, and strict no-attack policy against Commonwealth of Independent States (CIS) nations, VanHelsing is positioning itself not merely as a threat, but as a rising force in the ransomware ecosystem.  

What sets VanHelsing apart isn't just its speed or sophistication, it's the structured, profit-driven model powering its rise. Operating under the alias VanHelsingRaaS, the platform requires affiliates to pay a $5,000 deposit to join, granting them access to its infrastructure and tools. In return, affiliates pocket 80% of ransom payments, while the core operators retain the remaining 20%. This aggressive, reward-heavy setup has attracted a range of threat actors, from seasoned cybercriminals to technically novice opportunists, allowing VanHelsing to rapidly scale operations and target high-value sectors worldwide.

Demonstrating a rare level of versatility, VanHelsing is engineered to infect a wide array of systems, spanning Windows, Linux, BSD, ARM-based devices, and VMware ESXi environments. This cross-platform functionality amplifies its destructive potential and makes it especially appealing to affiliates looking to exploit diverse digital ecosystems with a single, adaptable tool.  

Targeted Industries: Government, Manufacturing, Pharmaceutical, Legal, Healthcare and Information Technology.

Targeted Countries: France, United States, Australia, Italy and Chile.  

An image representing VanHelsing RaaS recruitment advertisement

Technical Analysis

Initial Access

Recent activity linked to the VanHelsing ransomware group reveals a growing sophistication in how affiliates gain initial footholds into target environments. Among the most notable tactics:  

Execution

Once inside a target environment, VanHelsing Ransomware deploys a blend of stealth and automation to initiate its payload. The execution phase is marked by the use of Windows Management Instrumentation (WMI) queries, which help the malware gather system information and execute commands without raising alarms. Task scheduling is then used to ensure the ransomware runs at specific intervals or upon system reboot, maintaining a foothold. In addition, PowerShell scripts are leveraged for executing malicious code in-memory, reducing the chance of detection by traditional file-based security tools.  

Persistence and Defense Evasion

To maintain persistent access to compromised systems, VanHelsing employs a variety of techniques designed to survive reboots and evade detection. These include the use of bootkits and the creation of malicious Windows Services, allowing the ransomware to auto-start with the system. The group also leverages DLL side-loading, a method that abuses the way legitimate applications load dynamic libraries to execute malicious payloads stealthily. Additionally, affiliates have been observed distributing  infected browser extensions, granting persistent access through user sessions. VanHelsing also manipulates registry keys to silently run alongside, or even replace, legitimate processes, reinforcing its control while remaining hidden from security tools.  

Ransomware Execution

Once deployed, VanHelsing initiates its attack by scanning all accessible drives, including local and network volumes while intentionally bypassing critical system files to avoid system instability. It then proceeds to encrypt data using the ChaCha20 algorithm, generating a unique 256-bit key and a 12-byte nonce for each file. These values are securely encrypted using an embedded Curve25519 public key and stored within the encrypted file. VanHelsing applies full encryption to smaller files, while for those exceeding 1GB, it encrypts only the initial portion to speed up the process while retaining extortion leverage.  

The ransomware embeds the encryption metadata within each affected file and marks them with either a ".vanhelsing" or ".vanlocker" extension.  

Ransom Note

VanHelsing ransomware leverages a double extortion model to maximize pressure on victims. Before initiating file encryption, it quietly exfiltrates sensitive data, such as financial records, personal information, and proprietary documents. Once the files are locked, victims are not only demanded to pay for decryption but are also threatened with public exposure of the stolen data if they refuse.  Following encryption, VanHelsing alters the victim's desktop wallpaper and places a ransom note named "README.txt" in every affected folder. The note outlines the ransom demands and cautions against using third-party recovery tools, warning of potential permanent data loss.

It also maintains a private communication portal on darkweb, enabling direct negotiation between victims and the attackers.

Ransom Note of VanHelsing Ransomware

Impact

The impact of VanHelsing ransomware on affected organizations is both financially and operationally devastating. Victims are instructed to pay a ransom, typically in Bitcoin, with demands reportedly reaching as high as $500,000 to regain access to their encrypted data.  

To further complicate recovery, VanHelsing extracts sensitive system and email data, deletes shadow copies, and actively inhibits system restoration mechanisms.

VanHelsing techniques mapped to MITRE ATT&CK

Understanding VanHelsing's tactics through the MITRE ATT&CK framework provides valuable insight into its operational behavior and attack chain. By mapping its techniques to known adversary behaviors, defenders can better anticipate, detect, and respond to its actions.  

Tactic Technique ID
Initial AccessPhishingT1566
Valid AccountsT1078
Supply Chain CompromiseT1195
ExecutionWindows Management InstrumentationT1047
Shared ModulesT1129
Scheduled Task/JobT1053
Command and Scripting InterpreterT1059
PersistenceCreate or Modify System Process: Windows ServiceT1543.003
Boot or Logon Autostart Execution: Registry Run Keys / Startup FolderT1547.001
Pre-OS Boot: BootkitT1542.003
Hijack Execution Flow: DLL Side-LoadingT1574.002
Privilege EscalationProcess InjectionT1055
Abuse Elevation Control MechanismT1548
Defense EvasionDirect Volume AccessT1006
RootkitT1014
Obfuscated Files or Information: Software PackingT1027.002
MasqueradingT1036
Process InjectionT1055
Indicator RemovalT1070
Modify RegistryT1112
Indirect Command ExecutionT1202
File and Directory Permissions ModificationT1222
Abuse Elevation Control MechanismT1548
Hide Artifacts: Hidden Files and DirectoriesT1564.001
Hide Artifacts: Hidden WindowT1564.003
Credential AccessOS Credential DumpingT1003
Unsecured Credentials: Credentials In FilesT1552.001
DiscoveryQuery RegistryT1012
Process DiscoveryT1057
System Information DiscoveryT1082
File and Directory DiscoveryT1083
Network Share DiscoveryT1135
Software Discovery: Security Software DiscoveryT1518.001
CollectionData from Local SystemT1005
Email CollectionT1114
Data from Information RepositoriesT1213
Command and ControlApplication Layer ProtocolT1071
ProxyT1090
Ingress Tool TransferT1105
ImpactData DestructionT1485
Data Encrypted for ImpactT1486
Inhibit System RecoveryT1490
Resource HijackingT1496


Timeline of Notable Attacks in 2025

January 2025

February 2025  

March 2025

Securing Tomorrow: Defensive Takeaways from the VanHelsing Threat

The emergence of VanHelsing ransomware underscores the escalating complexity and impact of modern cyber threats in 2025. With its advanced techniques, multi-platform capabilities, and double-extortion model, VanHelsing poses a serious risk to both public and private sector organizations. This threat landscape calls for a shift from reactive defense to proactive resilience.  

To reduce the risk of compromise, organizations should adopt a comprehensive security posture:  

Sources Cited:

  1. https://www.cyfirma.com/research/vanhelsing-ransomware/
  2. https://research.checkpoint.com/2025/vanhelsing-new-raas-in-town/
  3. https://cyble.com/threat-actor-profiles/vanhelsing-ransomware-group/
  4. https://www.bleepingcomputer.com/news/security/new-vanhelsing-ransomware-targets-windows-arm-esxi-systems/
  5. https://fieldeffect.com/blog/new-vanhelsing-raas
  6. https://www.pcrisk.com/removal-guides/32432-vanhelsing-ransomware
  7. https://any.run/malware-trends/VanHelsing/

About Loginsoft

For over 20 years, leading companies in Telecom, Cybersecurity, Healthcare, Banking, New Media, and more have come to rely on Loginsoft as a trusted resource for technology talent. From startups, to product and enterprises rely on our services. Whether Onsite, Offsite, or Offshore, we deliver. With a track record of successful partnerships with leading technology companies globally, and specifically in the past 6 years with Cybersecurity product companies, Loginsoft offers a comprehensive range of security offerings, including Software Supply Chain, Vulnerability Management, Threat Intelligence, Cloud Security, Cybersecurity Platform Integrations, creating content packs for Cloud SIEM, Logs onboarding and more. Our commitment to innovation and expertise has positioned us as a trusted player in the cybersecurity space. Loginsoft continues to provide traditional IT services which include Software development & Support, QA automation, Data Science & AI, etc.

Expertise in Integrations with Threat Intelligence and Security Products: Built more than 250+ integrations with leading TIP, SIEM, SOAR, and Ticketing Platforms such as Cortex XSOAR, Anomali, ThreatQ, Splunk, IBM QRadar & Resilient, Microsoft Azure Sentinel, ServiceNow, Swimlane, Siemplify, MISP, Maltego, Cryptocurrency Digital Exchange Platforms, CISCO, Datadog, Symantec, Carbonblack, F5, Fortinet, and so on. Loginsoft is a partner with industry leading technology vendors Palo Alto, Splunk, Elastic, IBM Security, etc.

In addition, Loginsoft offers Research as a service: We're more than just experts in cybersecurity; we're your accredited in-house research team focused on unraveling the complexities of cybersecurity and future technologies. From Application Security to Threat Research, our seasoned professionals have cultivated expertise in every facet of the field. We've earned the trust of over 20 security platform companies, who count on our research and analysis to strengthen their cybersecurity solutions.

Interested to learn more? Let’s start a conversation.

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

BLOGS AND RESOURCES

Latest Articles