Question: Can I do anything to protect my practice’s remote coders’ computers from the latest ransomware threat I heard on the news? I think it’s called Venus. Maryland Subscriber Answer: The Health Sector Cybersecurity Coordination Center (HC3) issued an Analyst Note (see resource, end of answer) on Nov. 9, 2022, regarding the Venus ransomware threat. HC3 recommends placing Remote Desktop Services, including those operating on nonstandard TCP ports, behind a firewall. The agency also suggests several mitigations for a ransomware attack including, but not limited to: For more context, the Venus ransomware specifically targets publicly exposed Remote Desktop Services to encrypt Windows devices. Since it started operating in August 2022, the ransomware has claimed several victims around the world, including at least one healthcare entity in the United States. Initial ransom demands are believed to start around 1 bitcoin (BTC) or less than $20,000. The Analyst Note also mentions that the Venus ransomware operators aren’t believed to operate the threat as a ransomware-as-a-service (RaaS) and aren’t connected to data leak site (DLS) at the time of the note. “When executed, the Venus ransomware will attempt to terminate 39 processes associated with database servers and Microsoft Office applications,” according to the Analyst Note. The note also mentions that the ransomware will delete event logs, shadow copy volumes, and disable data execution prevention. Resource: Read the Analyst Note here, www.hhs.gov/sites/default/files/venus-ransomware-analyst-note.pdf.