Venus ransomware has been targeting healthcare organizations in the U.S., according to an analyst note issued by the Health Sector Cybersecurity Coordination Center (HC3) of the U.S. Department of Health and Human Services (HHS).

What does the alert say?

The report says that at least one healthcare entity in the U.S. fell victim to Venus ransomware recently.
  • Although the ransomware operators are not believed to operate as a RaaS model, it uses a wide variety of contact email addresses and TOX IDs, which indicates that it is possibly the work of multiple threat actors.
  • The ransomware has one new variant namely GOODGAME that uses the .venus extension. It is entirely different from VenusLocker malware that uses the ‘.venusf’ file extension during encryption.
  • This operation does not have any associated data leak site so far.

Impact and ransom demand

  • Its samples have been observed contacting IP addresses in various countries, including the U.S., the Netherlands, Great Britain, Denmark, France, Ireland, Russia, and Japan.
  • Open-source reports indicate that its initial ransom demands start around 1 BTC or less than $20,000.

Attack capabilities

Venus ransomware was first spotted in mid-August and since then it has been relatively active and encrypting victims worldwide.
  • The threat actors behind the ransomware operations are known for targeting publicly exposed Remote Desktop services to encrypt victims' Windows devices.
  • When executed, the Venus ransomware attempts to terminate processes associated with database services and Microsoft Office apps. In addition, it deletes event logs, Shadow Copy Volumes, and disables Data Execution Prevention.
  • It uses AES and RSA algorithms for file encryption and adds the .venus extension. The recent  GOODGAME variant adds a goodgamer filemarker and other information to the end of each encrypted file.

Security tips

Since the ransomware is targeting publicly-exposed Remote Desktop services, it is recommended to follow best practices and take precautions to secure Remote Desktop access to both desktops and servers. Administrators are suggested to use strong passwords, 2FA, firewalls (both software and hardware), and Network Level Authentication (NLA) to strengthen the security of the network.
Cyware Publisher

Publisher

Cyware