Venus Ransomware Is Targeting Healthcare Organizations: HHS - medtigo



Venus Ransomware Is Targeting Healthcare Organizations: HHS

Share on facebook
Share on twitter
Share on linkedin
Share on whatsapp

The United States Department of Health and Human Services (HHS) issued a warning yesterday that healthcare businesses across the nation are also being targeted by Venus ransomware assaults.  

As per Bleeping Computer, The Health Sector Cybersecurity Coordination Center (HC3) published an analyst note, and the HHS security team states that it is aware of at least one event in which Venus ransomware was installed on the networks of a U.S. healthcare organization.  

The research from HC3 claims that there isn’t any known data leak website that threat actors using Venus ransomware are known to utilize to post stolen data online.  

Since its initial detection in the middle of August 2022, Venus Ransomware has spread throughout the networks of numerous corporate victims around the world.  

The threat actors responsible for the Venus ransomware assaults are known to encrypt Windows machines via breaking into the victims’ publicly accessible Remote Desktop services.  

The ransomware will also remove event logs, Shadow Copy Volumes, and disable Data Execution Prevention on vulnerable endpoints in addition to ending database services and Office applications.  

Venus ransomware has been operational since August, and it has been relatively active, with daily additions to ID Ransomware.  

Federal authorities in the United States have issued warnings about more ransomware attacks this year that are aimed at healthcare companies nationwide.  

Previous advisories have included cautions about threat actors using the ransomware payloads Maui and Zeppelin to attack Healthcare and Public Health (HPH) organizations.  

The HPH sector is being targeted by persistent ransomware attacks by a cybercrime organization known as Daixin Team, the FBI, CISA, and HHS said last month.  


Last but not least, Professional Finance Company Inc (PFC), a full-service accounts receivables management company, disclosed in a data breach notification that a Quantum ransomware attack from late February resulted in a data breach that affected 657 healthcare organizations.  

However, given that PFC assists thousands of American healthcare, government, and utility organizations in ensuring that their clients pay their invoices on time, the hack might have had a considerably greater impact. 

Leave a Reply


Free CME credits

Both our subscription plans include Free CME/CPD AMA PRA Category 1 credits.

Digital Certificate PDF

On course completion, you will receive a full-sized presentation quality digital certificate.

medtigo Simulation

A dynamic medical simulation platform designed to train healthcare professionals and students to effectively run code situations through an immersive hands-on experience in a live, interactive 3D environment.

medtigo Points

medtigo points is our unique point redemption system created to award users for interacting on our site. These points can be redeemed for special discounts on the medtigo marketplace as well as towards the membership cost itself.
  • Registration with medtigo = 10 points
  • 1 visit to medtigo’s website = 1 point
  • Interacting with medtigo posts (through comments/clinical cases etc.) = 5 points
  • Attempting a game = 1 point
  • Community Forum post/reply = 5 points

    *Redemption of points can occur only through the medtigo marketplace, courses, or simulation system. Money will not be credited to your bank account. 10 points = $1.

All Your Certificates in One Place

When you have your licenses, certificates and CMEs in one place, it's easier to track your career growth. You can easily share these with hospitals as well, using your medtigo app.

Our Certificate Courses