The cybersecurity world is on high alert as a new, highly destructive ransomware group known as Anubis emerges with a devastating dual-threat model.
Unlike typical ransomware, Anubis not only encrypts files but also boasts a unique “wipe mode” that ensures data destruction is irreversible, even if victims pay the ransom.
Active since December 2024, this Ransomware-as-a-Service (RaaS) operation has already claimed victims in sectors such as healthcare, engineering, and construction, spanning multiple continents, including Australia, Canada, Peru, and the United States.
Anubis is distinguished by its advanced architecture and flexible affiliate program, making it a favorite among cybercriminals.
The malware is primarily distributed through sophisticated spear-phishing campaigns, emails carefully crafted to appear as if they come from trusted sources, enticing recipients into opening malicious attachments or clicking on dangerous links.
Once inside, Anubis leverages command-line parameters to control its behavior, such as:
The ransomware checks for administrative privileges, prompting the user if none are detected, and can relaunch itself with elevated rights to ensure maximum impact.
It systematically avoids system and application folders to maintain a low profile before launching its destructive payload.
The true horror of Anubis lies in its dual-threat model. In addition to encrypting files, marking them with the “.anubis” extension, and changing their icons, Anubis can wipe file contents via its “/WIPEMODE” function.
This process is shockingly effective: files remain on the system, but their contents are permanently erased, rendering recovery impossible.
This feature is paired with the deletion of Volume Shadow Copies using the command vssadmin delete shadows /for=norealvolume /all /quiet, further thwarting victims from restoring previous versions of their files.
Anubis’s encryption relies on the Elliptic Curve Integrated Encryption Scheme (ECIES), implemented in Go, similar to prior ransomware strains like EvilByte and Prince.
Its use of open-source cryptographic libraries demonstrates both technical competence and a willingness to evolve.
The malware also attempts to modify system icons and wallpapers as part of its psychological intimidation tactics, though these features did not always function as intended in recent deployments.
To counter the Anubis threat, organizations must adopt a comprehensive, layered security approach:
Security experts recommend solutions such as Trend Vision One™, which leverages AI-driven threat intelligence and centralized risk management to detect and block Anubis’s indicators of compromise.
With its 92% reduction in ransomware risk and rapid detection capabilities, Trend’s approach exemplifies the robust, proactive defense required to withstand today’s most destructive cyberthreats.
Anubis represents a dangerous evolution in ransomware, combining data theft, encryption, and irreversible destruction.
Its flexible affiliate model and multi-layered extortion strategies ensure rapid spread and maximum damage. Only a vigilant, informed, and proactive defense can hope to stem the tide of this formidable cyber menace.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…