www.malwarebytes.com Open in urlscan Pro
2600:9000:206f:3000:16:26c7:ff80:93a1  Public Scan

URL: https://www.malwarebytes.com/blog/news/2022/10/venus-ransomware-targets-remote-desktop-services
Submission: On October 31 via api from DE — Scanned from DE

Form analysis 2 forms found in the DOM

GET

<form id="search-form" onsubmit="submitSearchBlog(event)" method="get">
  <div class="searchbar-wrap-rightrail">
    <label for="cta-labs-rightrail-search-submit-en" aria-label="cta-labs-rightrail-search-submit-en" aria-labelledby="cta-labs-rightrail-search-submit-en">
      <input type="text" id="st-search-input-rightrail" class="st-search-input-rightrail" placeholder="Search Labs">
    </label>
    <button type="submit" id="cta-labs-rightrail-search-submit-en" aria-label="Submit your search query"><span class=""><img src="/blog/images/search.svg" alt="Magnifying glass"></span>
    </button>
  </div>
</form>

/newsletter/

<form class="newsletter-form form-inline" action="/newsletter/">
  <div class="email-input">
    <label for="cta-footer-newsletter-input-email-en" aria-label="cta-footer-newsletter-input-email-en" aria-labelledby="cta-footer-newsletter-input-email-en">
      <input type="text" class="email-input-field" id="cta-footer-newsletter-input-email-en" name="email" placeholder="Email Address">
    </label>
    <input name="source" type="hidden" value="">
    <input type="submit" class="submit-bttn" id="cta-footer-newsletter-subscribe-email-en" value="">
  </div>
</form>

Text Content

The official Malwarebytes logoThe official Malwarebytes logo in a blue font
       
Personal
Personal
 * Security & Antivirus
 * Malwarebytes for Windows
 * Malwarebytes for Mac
 * Malwarebytes for Chromebook
 * Malwarebytes for Android
 * Malwarebytes for iOS
 * Malwarebytes AdwCleaner

 * Online Privacy
 * Malwarebytes Privacy VPN
 * Malwarebytes Browser Guard
 *  
 * All-in-one Protection

 * Malwarebytes Premium + Privacy VPN   New

 * Get Started

 * The ultimate guide to privacy protection  New
   
   VISIT PRIVACY HUB  VISIT PRIVACY HUB

 *  

 * Stop infections before they happen

 * GET A FREE TRIAL  GET A FREE TRIAL

 *  

 * Find the right solution for you

 * SEE PERSONAL PRICING  SEE PERSONAL PRICING

Business
Business
 * Solutions
 * BY COMPANY SIZE
 * Small Businesses
 * single figure icon  1-99 Employees  Buy Online
 * Mid-size Businesses
 * two figure icon  100-999 Employees
 * Large Enterprise
 * three figure icon  1000+ Employees
 * BY INDUSTRY
 * Education
 * Finance
 * Healthcare
 * Government

 * Products
 * CLOUD-BASED SECURITY MANAGEMENT
 * Endpoint Protection
 * Endpoint Protection for Servers
 * Endpoint Detection & Response
 * Endpoint Detection & Response for Servers
 * Incident Response
 * Nebula Platform Architecture
 * CLOUD-BASED SECURITY MODULES
 * DNS Filtering
 * Vulnerability & Patch Management
 * Remediation Connector Solution
 * SECURITY SERVICES
 * Managed Detection and Response  New
 * Cloud Storage Scanning Service  New
 * Malware Removal Service
 * NEXT-GEN ANTIVIRUS FOR SMALL BUSINESS
 * For Teams

 * Get Started
 *  * Find the right solution for your business
    * See business pricing See business pricing
   
   --------------------------------------------------------------------------------
   
    * Don't know where to start?
    * Help me choose a product See business products selector
   
   --------------------------------------------------------------------------------
   
    * See what Malwarebytes can do for you
    * Get a free trial Get a free trial
   
   --------------------------------------------------------------------------------
   
    * Our sales team is ready to help. Call us now
    * Phone icon +49 (800) 723-4800

Pricing
Partners
Partners
 * Partner Icon Explore Partnerships

 * Partner Solutions
 * Resellers
 * Managed Service Providers
 * Computer Repair
 * Technology Partners
 * Buy now Buy Now

 * Partner Success Story
 * Marek Drummond
   Managing Director at Optimus Systems
   
   "Thanks to the Malwarebytes MSP program, we have this high-quality product in
   our stack. It’s a great addition, and I have confidence that customers’
   systems are protected."

 * See full story See full story

Resources
Resources
 * Learn About Cybersecurity
 * Antivirus
 * Malware
 * Ransomware
 * Malwarebytes Labs – Blog
 * Glossary
 * Threat Center

 * Business Resources
 * Reviews
 * Analyst Reports
 * Case Studies
 * Press & News

 * Events
 * 
   
   
   
   Featured Event: RSA 2021

 * See Event See event

Support
Support
 * Technical Support
 * Personal Support
 * Business Support
 * Premium Services
 * Forums
 * Vulnerability Disclosure

 * Watch Icon Training for Personal Products
 * Watch Icon Training for Business Products

 * Featured Content
 * Privacy Logo
   
   
   
   Activate Malwarebytes Privacy on Windows device.

 * See Content See content

FREE DOWNLOAD
CONTACT US
CONTACT US
 * Personal Support
 * Business Support
 * Talk to Sales
 * Contact Press
 * Partner Programs
 * Submit Vulnerability

COMPANY
COMPANY
 * About Malwarebytes
 * Careers
 * News & Press

SIGN IN
SIGN IN
 * My Account
 * Cloud Console
 * Partner Portal

SUBSCRIBE


News


VENUS RANSOMWARE TARGETS REMOTE DESKTOP SERVICES

Posted: October 20, 2022 by Christopher Boyd

We take a look at reports of Venus ransomware targeting remote desktop
services/RDP.

It’s time for another tale of remote desktop disaster, as a newish form of
ransomware carves out a name for itself. Bleeping Computer reports that
individuals behind Venus ransomware are breaking into “publicly exposed Remote
Desktop services”, with the intention of encrypting any and all Windows devices.
Since at least August 2022, Venus has been causing chaos and has become rather
visible lately.




VENUS BRINGS BAD REMOTE TIDINGS

It seems these attacks very much follow the typical Remote Services/Remote
Desktop Protocol (RDP) gameplan. Break into the network via insecure access,
stop processes and services according to the whims of the ransomware authors,
and then encrypt the desired files. Confused people on the network will now find
their filenames end with the .venus extension, and additional file markers with
no currently obvious purpose placed inside the encrypted files.

The incredibly overt ransom note, which is somewhat difficult to read given it
sports white text on a bright orange background, reads as follows:

"We downloaded and encrypted your data. Only we can decrypt your data.
IMPORTANT! If you, your programmers or your friends would try to help you to
decrypt the files it can cause data loss even after you pay. In this case we
will not be able to help you. Do not play with files. Do not rename encrypted
files. Do not try to decrypt your data using third party software, it may cause
permanent data loss. Decryption of your files with the help of third parties may
cause increased price or you can become a victim of a scam."

You know, as opposed to being the victim of this scam instead.


A RISK WHETHER AT HOME OR IN THE OFFICE

Bleeping Computer notes one victim on their forum made several posts about being
struck by this particular slice of ransomware. This individual found their home
network under attack, external drives compromised, and a PC elsewhere in the
house being used as a server receiving similar treatment.

In this case, the issue was RDP left running as a way to access a computer
remotely. The victim notes that RDP was password protected, but it seems the
password may not have been enough. This—and the timeless classic of having
backup devices available but not getting round to doing the actual backing
up—proved to be a dreadful combination blow.


TIPS FOR AVOIDING THE RDP TO RANSOMWARE PIPELINE

RDP specifically continues to be a sore point for networks whether at home or in
the office. Even with password protection, it may not be enough, as we've just
seen to devastating effect for one unlucky individual.

If you’re running Windows 11, you’ll be pleased to know that Microsoft is taking
action to help shore up the ways attackers can use RDP to break in. This has
been achieved by limiting the number of times you can attempt to login, as per
our article from back in July. If you’re interested in locking down your RDP in
other ways, we have a long list of tactics for you to try out. The full list of
tricks and tips from March can be seen here. Some of the key actions you should
consider taking right now include:

 * Use multifactor authentication for your RDP access. Attackers may crack your
   password, but without that second form of authentication to hand they’re
   going to find it a lot harder to get in.
 * Rate limiting may now be somewhat redundant if you’re using Windows
   11 considering recent security changes, but if not, this will slow down the
   speed that attackers can keep trying to guess your login.
 * Place your RDP behind a VPN, but make sure you focus on keeping the VPN login
   secure as this is now your new point of access. This can be done by using
   multifactor authentication for login, and ensuring any email address tied to
   your account is similarly protected. If you're able to use rate limiting
   alongside your VPN login too, then so much the better.

Stay safe out there!

SHARE THIS ARTICLE

--------------------------------------------------------------------------------

COMMENTS



--------------------------------------------------------------------------------

RELATED ARTICLES

News


A WEEK IN SECURITY (OCTOBER 24 - 30)

October 31, 2022 - The most important and interesting computer security stories
from the last week.

CONTINUE READING 0 Comments

Exploits and vulnerabilities | News


A CHROME FIX FOR AN IN-THE-WILD EXPLOIT IS OUT—CHECK YOUR VERSION

October 28, 2022 - Google has issued an update for Chrome to fix an issue in the
V8 JavaScript engine

CONTINUE READING 0 Comments

Business


WHAT IS RANSOMWARE-AS-A-SERVICE AND HOW IS IT EVOLVING?

October 27, 2022 - Diving into how RaaS works, why it poses a unique threat to
businesses, and how small-and-medium-sized (SMBs) businesses can prepare for the
next generation of RaaS attacks.

CONTINUE READING 1 Comment

News


MEDIBANK CUSTOMERS' PERSONAL DATA COMPROMISED BY CYBER ATTACK

October 27, 2022 - Australian health care insurance company Medibank confirmed
that the threat actor behind the cyberattack on the company had access to the
data of at least 4 million customers

CONTINUE READING 0 Comments

News


MAINTENANCE MODE AIMS TO KEEP PHONE DATA PRIVATE DURING REPAIRS

October 27, 2022 - We take a look at a new mode developed by Samsung which aims
to keep data safe during a repair.

CONTINUE READING 0 Comments

--------------------------------------------------------------------------------

ABOUT THE AUTHOR

Christopher Boyd
Lead Malware Intelligence Analyst

Former Director of Research at FaceTime Security Labs. He has a very particular
set of skills. Skills that make him a nightmare for threats like you.


Contributors


Threat Center


Podcast


Glossary


Scams


Write for Labs

Cyberprotection for every one.

twitter
facebook
linkedin
Youtube
instagram

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our
newsletter and learn how to protect your computer from threats.



Cyberprotection for every one.

FOR PERSONAL

Windows

Mac

iOS

Android

VPN Connection

SEE ALL

COMPANY

About Us

Contact Us

Careers

News and Press

Blog

Scholarship

Forums

FOR BUSINESS

Small Businesses

Mid-size Businesses

Large Enterprise

Endpoint Protection

Endpoint Detection & Response

Managed Detection and Response (MDR)

MY ACCOUNT

Sign In

SOLUTIONS

Free Rootkit Scanner

Free Trojan Scanner

Free Virus Scanner

Free Spyware Scanner

Anti Ransomware Protection

SEE ALL

ADDRESS

3979 Freedom Circle
12th Floor
Santa Clara, CA 95054

ADDRESS

One Albert Quay
2nd Floor
Cork T12 X8N6
Ireland

LEARN

Malware

Hacking

Phishing

Ransomware

Computer Virus

Antivirus


What is VPN?

COMPANY

About Us

Contact Us

Careers

News and Press

Blog

Scholarship

Forums

MY ACCOUNT

Sign In

ADDRESS

3979 Freedom Circle, 12th Floor
Santa Clara, CA 95054

ADDRESS

One Albert Quay, 2nd Floor
Cork T12 X8N6
Ireland

twitter
facebook
linkedin
Youtube
instagram
   English
Legal
Privacy
Accessibility
Vulnerability Disclosure
Terms of Service


© 2022 All Rights Reserved

Select your language

 * English
 * Deutsch
 * Español
 * Français
 * Italiano
 * Português (Portugal)
 * Português (Brasil)
 * Nederlands
 * Polski
 * Pусский
 * 日本語
 * Svenska