{"id":5531,"date":"2022-11-24T09:00:00","date_gmt":"2022-11-24T09:00:00","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=5531"},"modified":"2026-01-25T07:50:32","modified_gmt":"2026-01-25T07:50:32","slug":"venus-ransomware-hits-healthcare","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare","title":{"rendered":"Venus Ransomware Hits Healthcare"},"content":{"rendered":"\n<p>We can all agree: ransomware perpetrators are the lowest of the low. The general consensus proved to be truer than ever during the Covid-19 pandemic when healthcare organizations \u2013 previously left alone for the most part as an \u2018unspoken rule\u2019 amongst hackers \u2013 became popular targets for cyber criminals,<\/p>\n\n\n\n<p>Unfortunately, hackers haven\u2019t let up in this area post-Covid. It\u2019s been revealed by the United States Department of Health and Human Services (HHS) that one, possibly more, healthcare firms have fallen victim to ransomware over the past few months.<\/p>\n\n\n\n<p>The culprit? Venus ransomware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Venus Rising<\/h2>\n\n\n\n<p>Far from having the qualities of its planetary namesake (love, beauty, prosperity, victory), Venus is a run-of-the-mill piece of ransomware that targets the Windows OS.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/venus-ransomware-targets-publicly-exposed-remote-desktop-services\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>&nbsp;provides the breakdown:<\/p>\n\n\n\n<p>1. Initial access is gained via exposed RDP session \u2013 one of the two most common attack vectors, along with phishing. The hackers scan all ports (not just the default 3389 RDP listening port), listen for a response to determine an RDP connection, then likely gain access via brute force.<\/p>\n\n\n\n<p>2. Once access to the target system is gained, the malware attempts to kill the following 39 processes relating to Microsoft Office apps and database servers:<\/p>\n\n\n\n<p>taskkill, msftesql.exe, sqlagent.exe, sqlbrowser.exe, sqlservr.exe, sqlwriter.exe, oracle.exe, ocssd.exe, dbsnmp.exe, synctime.exe, mydesktopqos.exe, agntsvc.exe, isqlplussvc.exe, xfssvccon.exe, mydesktopservice.exe, ocautoupds.exe, agntsvc.exe, agntsvc.exe, agntsvc.exe, encsvc.exe, firefoxconfig.exe, tbirdconfig.exe, ocomm.exe, mysqld.exe, mysqld-nt.exe, mysqld-opt.exe, dbeng50.exe, sqbcoreservice.exe, excel.exe, infopath.exe, msaccess.exe, mspub.exe, onenote.exe, outlook.exe, powerpnt.exe, sqlservr.exe, thebat64.exe, thunderbird.exe, winword.exe, wordpad.exe<\/p>\n\n\n\n<p>3. It then goes about deleting event logs, VSS Shadow Copies, and disables Data Execution Prevention using the command below:<\/p>\n\n\n\n<p>wbadmin delete catalog -quiet &amp;&amp; vssadmin.exe delete shadows \/all \/quiet &amp;&amp; bcdedit.exe \/set {current} nx AlwaysOff &amp;&amp; wmic SHADOWCOPY DELETE<\/p>\n\n\n\n<p>4. After all of the above is successfully completed, the stage is set for encryption. Venus appends .venus to encrypted files (in addition to the existing file extension), and a bright orange HTA ransom note is automatically displayed on the victim\u2019s screen:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/VenusRansomNote.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><em>Source: Bleeping Computer<\/em><\/p>\n\n\n\n<p>Notably, to date the perpetrators do not seem to be focused on Data leakage, instead pouring all their efforts into encryption.<\/p>\n\n\n\n<p>Venus also doesn\u2019t discriminate based on target type or size. As well as healthcare giants, there have been&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/forums\/t\/777945\/venus-ransomware-support-help-topic-venus-readmehtml\/\" target=\"_blank\" rel=\"noreferrer noopener\">reports from individuals on Bleeping Computer<\/a>&nbsp;who have found files on their home PCs and servers sporting the .venus extension.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tips for Prevention<\/h2>\n\n\n\n<p>When you break it down, there are essentially three stages to the Venus attack. The first is the initial infection \u2013 the malicious software finding its way into your IT system. Then comes \u2018setting the scene\u2019 for encryption, and the third and final stage is the encryption itself. Everything prior to stage three can be recovered from if detected, but once your files are appended with the dreaded .venus\u2026 start saving for at least 1 BTC if you\u2019re an individual, and likely upwards of 20 if you\u2019re an enterprise. (Just kidding, it\u2019s advised to never pay a ransom.)<\/p>\n\n\n\n<p>Let\u2019s start with the initial-infection attack vector, Remote Desktop Protocol (RDP). It\u2019s a readily available direct path to another endpoint or network, and it provides native access to the victim\u2019s system. The credentials used to create an RDP connection are usually administrator credentials, meaning if an attacker manages to obtain these, they then have full privileges on the endpoint and can do a lot more damage.<\/p>\n\n\n\n<p><strong>Tip 1:&nbsp;<\/strong>Stop using RDP.<\/p>\n\n\n\n<p>In fact, with Venus (and most ransomware), elevated privileges are a requirement for stage 2: successfully preparing for encryption. Venus has to stop services and processes, delete event logs and shadow volume copies, and disable critical software prior to encryption \u2013 none of these tasks can be completed by a standard user.<\/p>\n\n\n\n<p><strong>Tip 2:&nbsp;<\/strong>Restrict administrative privileges.<\/p>\n\n\n\n<p>While Venus ransomware is busy killing Windows services and deleting logs, the user remains blissfully unaware of what is happening because the exact tools that should alert them to the situation have been circumvented by the ransomware &#8211; it can proceed to the third and final encryption stage unhindered.<\/p>\n\n\n\n<p><strong>Tip 3:<\/strong>&nbsp;Use a third-party Auditing tool.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Turning Tips into Tools<\/h2>\n\n\n\n<p>It\u2019s all well and good to know what you need to be doing to protect your enterprise from threats such as Venus ransomware, but putting reliable protective measures in place is a whole other ball game.<\/p>\n\n\n\n<p>With Admin By Request Privileged Access Management (PAM) solution, each of the three stages of a Venus attack can be prevented or detected prior to successful encryption.<\/p>\n\n\n\n<p>From the User Portal, you can block any application from running on every endpoint that the software is deployed to. Create a blanket rule that RDP can\u2019t be used at your organization, and enforce it by Blocking the application:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/Blocklist.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>In terms of privileged access, Admin By Request allows for the instant revocation of your users\u2019 elevated privileges. All users become standard user \u2013 unless specified otherwise in the User Portal, where you can create granular access rules for different users, groups, and OUs.<\/p>\n\n\n\n<p>Users who require elevated privileges to do their jobs can remain productive (and protected) with Admin By request, which provides Just-In-Time elevation for individual applications upon request, rather than elevating the user or allowing them to have around-the-clock privileges.<\/p>\n\n\n\n<p>In terms of event logging, Venus is programmed to shut down the built-in Windows tools that would give you an idea of its presence in the system. Admin By Request offers a detailed Auditlog which tracks and records all elevated activity. Actions like stopping processes, deleting privileged data, and disabling key pieces of software are all logged with relevant details such as the time, file, and the user who enacted the change included. Alerting capabilities detect actions deemed suspicious, and send desktop or email notifications based on your configuration.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">TL, DR<\/h2>\n\n\n\n<p>With Admin By Request deployed and configured appropriately, Venus ransomware would be unable to enact its attack plan on your endpoints and encrypt your organization\u2019s data.<\/p>\n\n\n\n<p>Download the\u00a0<a href=\"\/en\/freeplandownload\" target=\"_blank\" rel=\"noreferrer noopener\">Admin By Request Free Plan<\/a>\u00a0or book a demo today to get started \u2013 and rest assured your enterprise won\u2019t be the next to make headlines.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Initial infection via RDP, killing 39 processes, deleting event logs, then encryption &#8211; but all stages of the Venus ransomware attack can be prevented with the right tools.<\/p>\n","protected":false},"author":2,"featured_media":5532,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[89,80,83,90,91,81,82,62,79,85,86,87,88],"ppma_author":[9],"class_list":["post-5531","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-criminal","tag-current-events","tag-cyber-attack","tag-cyber-criminal","tag-hacker","tag-healthcare","tag-malware","tag-microsoft","tag-ransomware","tag-rdp","tag-remote-desktop-protocol","tag-venus","tag-venus-ransomware","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Initial infection via RDP, killing 39 processes, deleting event logs, then encryption - but all stages of the Venus ransomware attack can be prevented with the right tools.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"criminal,current events,cyber attack,cyber criminal,hacker,healthcare,malware,microsoft,ransomware,rdp,remote desktop protocol,venus,venus ransomware\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Venus Ransomware Hits Healthcare \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Initial infection via RDP, killing 39 processes, deleting event logs, then encryption - but all stages of the Venus ransomware attack can be prevented with the right tools.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2022-11-24T09:00:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T07:50:32+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Venus Ransomware Hits Healthcare \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Initial infection via RDP, killing 39 processes, deleting event logs, then encryption - but all stages of the Venus ransomware attack can be prevented with the right tools.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/venus-ransomware-hits-healthcare#blogposting\",\"name\":\"Venus Ransomware Hits Healthcare \\u00bb Admin By Request\",\"headline\":\"Venus Ransomware Hits Healthcare\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/VenusBannerBackground.png\",\"width\":2000,\"height\":1332,\"caption\":\"Grey, orange and white code.\"},\"datePublished\":\"2022-11-24T09:00:00+00:00\",\"dateModified\":\"2026-01-25T07:50:32+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/venus-ransomware-hits-healthcare#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/venus-ransomware-hits-healthcare#webpage\"},\"articleSection\":\"Blogs, Criminal, Current Events, Cyber Attack, Cyber Criminal, Hacker, Healthcare, Malware, Microsoft, Ransomware, RDP, Remote Desktop Protocol, Venus, Venus Ransomware, S Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/venus-ransomware-hits-healthcare#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/venus-ransomware-hits-healthcare#listItem\",\"name\":\"Venus Ransomware Hits Healthcare\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/venus-ransomware-hits-healthcare#listItem\",\"position\":3,\"name\":\"Venus Ransomware Hits Healthcare\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/venus-ransomware-hits-healthcare\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/venus-ransomware-hits-healthcare\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/venus-ransomware-hits-healthcare#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/venus-ransomware-hits-healthcare\",\"name\":\"Venus Ransomware Hits Healthcare \\u00bb Admin By Request\",\"description\":\"Initial infection via RDP, killing 39 processes, deleting event logs, then encryption - but all stages of the Venus ransomware attack can be prevented with the right tools.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/venus-ransomware-hits-healthcare#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/VenusBannerBackground.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/venus-ransomware-hits-healthcare\\\/#mainImage\",\"width\":2000,\"height\":1332,\"caption\":\"Grey, orange and white code.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/venus-ransomware-hits-healthcare#mainImage\"},\"datePublished\":\"2022-11-24T09:00:00+00:00\",\"dateModified\":\"2026-01-25T07:50:32+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Venus Ransomware Hits Healthcare \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"Venus Ransomware Hits Healthcare \u00bb Admin By Request","description":"Initial infection via RDP, killing 39 processes, deleting event logs, then encryption - but all stages of the Venus ransomware attack can be prevented with the right tools.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"criminal,current events,cyber attack,cyber criminal,hacker,healthcare,malware,microsoft,ransomware,rdp,remote desktop protocol,venus,venus ransomware","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare#blogposting","name":"Venus Ransomware Hits Healthcare \u00bb Admin By Request","headline":"Venus Ransomware Hits Healthcare","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/01\/VenusBannerBackground.png","width":2000,"height":1332,"caption":"Grey, orange and white code."},"datePublished":"2022-11-24T09:00:00+00:00","dateModified":"2026-01-25T07:50:32+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare#webpage"},"articleSection":"Blogs, Criminal, Current Events, Cyber Attack, Cyber Criminal, Hacker, Healthcare, Malware, Microsoft, Ransomware, RDP, Remote Desktop Protocol, Venus, Venus Ransomware, S Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare#listItem","name":"Venus Ransomware Hits Healthcare"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare#listItem","position":3,"name":"Venus Ransomware Hits Healthcare","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare","name":"Venus Ransomware Hits Healthcare \u00bb Admin By Request","description":"Initial infection via RDP, killing 39 processes, deleting event logs, then encryption - but all stages of the Venus ransomware attack can be prevented with the right tools.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/01\/VenusBannerBackground.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare\/#mainImage","width":2000,"height":1332,"caption":"Grey, orange and white code."},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare#mainImage"},"datePublished":"2022-11-24T09:00:00+00:00","dateModified":"2026-01-25T07:50:32+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Venus Ransomware Hits Healthcare \u00bb Admin By Request","og:description":"Initial infection via RDP, killing 39 processes, deleting event logs, then encryption - but all stages of the Venus ransomware attack can be prevented with the right tools.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2022-11-24T09:00:00+00:00","article:modified_time":"2026-01-25T07:50:32+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Venus Ransomware Hits Healthcare \u00bb Admin By Request","twitter:description":"Initial infection via RDP, killing 39 processes, deleting event logs, then encryption - but all stages of the Venus ransomware attack can be prevented with the right tools.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"5531","title":"#post_title #separator_sa #site_title","description":"#post_excerpt","keywords":null,"keyphrases":null,"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":null,"og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":null,"robots_max_videopreview":null,"robots_max_imagepreview":"large","priority":null,"frequency":null,"local_seo":null,"seo_analyzer_scan_date":"2026-01-25 08:16:25","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2023-05-22 22:01:14","updated":"2026-01-25 08:16:25"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tVenus Ransomware Hits Healthcare\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"Venus Ransomware Hits Healthcare","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/venus-ransomware-hits-healthcare"}],"authors":[{"term_id":9,"user_id":2,"is_guest":0,"slug":"sophie-admin","display_name":"S Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png"},"author_category":"","user_url":"","last_name":"Dodson","first_name":"S","job_title":"","description":"With a solid background in computer science and graphic design, my career kicked off writing tech manuals for various companies in both the software and hardware realms. I then side-stepped into marketing and found my passion in cybersecurity.\r\n\r\nI fuse my tech know-how with design skills to craft engaging blogs that spotlight cybersecurity for businesses. My main focus now is championing the marketing efforts of Admin By Request Zero Trust Platform, where my creative take on cybersecurity helps me create content that's enlightening, entertaining, and impactful.\r\n\r\nMy articles have graced the pages of InfoSec Magazine and top-tier security websites like OPSWAT. I'm on a mission to stress the significance of cybersecurity and to showcase how Admin By Request is shaking things up by making enterprise solutions simple, intuitive, accessible, and affordable to organizations of all sizes, in any industry.\r\n\r\nMy goal is to craft content that informs, intrigues, and motivates action, helping businesses understand the pivotal role of cybersecurity in the digital age we're now living in. Through my work, I aim to close the gap between technology and its real-world applications, keeping our audience well-informed, interested, and ready for the ever-evolving cybersecurity landscape.\r\n\r\nI bring a blend of extensive experience, deep expertise, recognized authority, and unwavering commitment to trustworthiness in cybersecurity. My goal? To make complex topics relatable and actionable for businesses of all sizes - just like Admin By Request strives to do."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/5531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=5531"}],"version-history":[{"count":2,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/5531\/revisions"}],"predecessor-version":[{"id":10663,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/5531\/revisions\/10663"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/5532"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=5531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=5531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=5531"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=5531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}