The VanHelsing ransomware operation, a prominent ransomware-as-a-service (RaaS) group that emerged in March 2025, has made headlines after leaking its source code.
This move came in response to an alleged former developer, known as ‘th30c0der,’ who attempted to sell the builder and related assets on the RAMP cybercrime forum for $10,000.
The leak includes the Windows encryptor builder, affiliate panel, and data leak blog, but notably omits the Linux builder and databases, which would have been of significant interest to security researchers and law enforcement.
The Van Helsing group stated that the leak was a preemptive measure to thwart the developer’s scam attempt.
In a public message, the operators accused 30c0der of being a disgruntled ex-developer and announced their intention to release an improved version, “VanHelsing 2.0,” shortly.
The group’s decision to leak the code themselves reflects ongoing internal tensions and highlights the risks of collaboration within cybercriminal enterprises.
Technical Analysis of the Leak
Security researchers who analyzed the leaked files confirmed their authenticity but noted that the package is incomplete and somewhat disorganized.
The Windows encryptor builder’s source code was found in the “Release” folder, typically reserved for compiled binaries, indicating a lack of standard development practices.
The builder is functional but requires modifications to operate, as it connects to the affiliate panel at IP address 31.222.238[.]208 to retrieve configuration data.
Since the affiliate panel’s source code is also part of the leak, threat actors could adapt or host their versions to make the builder work.
The archive includes:
- The Windows encryptor builder (used to create customized ransomware payloads)
 - Source code for the affiliate panel (the web interface for managing affiliates)
 - Data leak blog platform (used for double extortion tactics)
 - Source code for a decryptor and loader
 - Evidence of ongoing development of an MBR (Master Boot Record) locker, designed to overwrite the system’s boot sector and display a ransom lock message at startup
 
VanHelsing ransomware is known for advanced encryption techniques, appending a “.vanhelsing” extension to encrypted files, and employing double extortion, threatening to leak stolen data if ransoms are not paid.
It uses a variety of MITRE ATT&CK techniques, including process injection (T1055), scheduled tasks (T1053), DLL side-loading (T1574.002), and bootkit persistence (T1542.003), making it challenging to detect and remove.
Implications for the Cybercrime Ecosystem
The leak of VanHelsing’s source code mirrors previous incidents involving Babuk, Conti, and LockBit ransomware groups, where internal disputes or law enforcement pressure led to the public release of critical ransomware components.
These leaks have historically enabled new threat actors to launch attacks with minimal technical effort, a phenomenon known as the “mutation effect.” For example, the Babuk leak in 2021 led to a proliferation of new ransomware strains, as criminals adapted the code to their purposes.
Security experts warn that such leaks lower the barrier to entry for aspiring cybercriminals, allowing them to quickly deploy sophisticated ransomware campaigns using “ready-made” toolkits.
The VanHelsing leak, despite being incomplete, provides enough technical material for malicious actors to modify and repurpose for future attacks.
As the group promises a forthcoming “VanHelsing 2.0,” the ransomware landscape is likely to become even more complex and dangerous in the coming months.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates