VanHelsing Ransomware-as-a-Service Emerges as a Significant Cybersecurity Threat

Published 3 days ago
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

VanHelsingRaaS (Ransomware-as-a-Service) launched on March 7, 2025, providing a structured platform for affiliates to launch ransomware attacks efficiently, significantly lowering the barrier of entry into the ransomware market.

Since its launch, VanHelsingRaaS has infected at least three known victims in under two weeks. Investigations by Check Point Research (CPR) highlight its aggressive and fast-paced evolution, with two ransomware variants discovered just five days apart. 

VanHelsingRaaS employs a straightforward affiliate model. Participants pay an initial $5,000 deposit to join (waived for experienced affiliates). The service offers an 80/20 revenue split, with 80% of ransom payments going to the affiliated attackers and 20% retained by the core operators. 

VanHelsing Raas Advertisement.
VanHelsing RaaS Advertisement | Source: Check Point Research

The program provides affiliates with a user-friendly control panel to execute attacks, alongside versatile ransomware "locker" software. This locker targets not just Windows systems but also additional platforms like Linux, BSD, ARM, and ESXi environments, making VanHelsing particularly dangerous.

VanHelsing Control Panel.
VanHelsing Control Panel | Source: Check Point Research

During negotiations, affiliates typically demand ransom payments of $500,000 in Bitcoin. However, VanHelsing enforces a notable limitation. Affiliates are prohibited from encrypting systems in Commonwealth of Independent States (CIS) countries, a common restriction observed in ransomware operations associated with Eastern Europe.

The newer variant introduced enhanced features via additional command-line arguments to customize encryption behaviors and further streamline attack execution. 

The VanHelsing ransomware is written in C++ and includes advanced capabilities such as:

Despite its cutting-edge features, the ransomware contains some operational flaws. The actual encrypted file extension, .vanhelsing, does not align with its expected .vanlocker extension, disrupting file association functions. Certain functionalities, such as propagating through VMware vCenter servers, remain incomplete placeholders.

VanHelsingRaaS achieves what many similar platforms have aimed for – but at unparalleled speed and scale.



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: