Monday, April 28, 2025
Homecyber securityNew Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

Published on

SIEM as a Service

Follow Us on Google News

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the cybersecurity landscape.

Active since late 2024, Anubis employs advanced techniques and operates across multiple platforms, including Windows, Linux, NAS, and ESXi environments.

The group is leveraging ransomware-as-a-service (RaaS) and other affiliate-based monetization models to expand its reach and impact.

- Advertisement - Google News

Technical Capabilities and Targeted Platforms

Anubis ransomware is reportedly developed using the ChaCha+ECIES encryption algorithm, enabling robust data encryption.

It targets x64/x32 architectures across various environments while elevating privileges to NT AUTHORITY\SYSTEM for deeper system access.

The malware also features self-propagation capabilities, allowing it to encrypt entire domains efficiently.

These functionalities are managed via a user-friendly web panel designed for affiliates.

The group’s operations highlight a focus on critical industries, including healthcare and engineering sectors.

Their recent victims include organizations in Australia, Canada, Peru, and the United States.

Notably, two of their four confirmed victims belong to the healthcare sector, underscoring their potential focus on industries with sensitive data.

Affiliate Programs: Diversified Monetization Models

Anubis has introduced a range of affiliate programs to attract cybercriminal collaborators:

  1. Ransomware-as-a-Service (RaaS): Affiliates receive 80% of ransom payments for deploying Anubis ransomware.
  2. Data Ransom Program: This model focuses on monetizing stolen data through public exposure threats, offering affiliates 60% of the revenue. The stolen data must meet specific criteria, such as exclusivity and relevance.
  3. Access Monetization Program: Initial Access Brokers can sell corporate credentials to Anubis for a 50% revenue share. This program includes detailed victim profiling to maximize extortion leverage.

These programs reflect a well-structured business model aimed at maximizing profitability through multiple revenue streams.

According to Kela, Anubis operates with a high degree of sophistication.

Their tactics include publishing investigative articles about victims on hidden blog pages to pressure organizations into paying ransoms.

Anubis Ransomware
Screenshot of homepage of Anubis’ blog 

If negotiations fail, the group publicly releases stolen data on their blog or social media platforms.

They have also been observed notifying regulatory authorities and affected parties to amplify the pressure on victims.

The group’s representatives are active on Russian-speaking cybercrime forums such as RAMP and XSS under aliases like “superSonic” and “Anubis__media.”

Their posts suggest prior experience in ransomware operations, potentially as affiliates of other groups.

The emergence of Anubis underscores the evolving nature of ransomware threats.

Their technical expertise, combined with innovative business models and a focus on critical sectors, makes them a formidable adversary.

Organizations are advised to strengthen their cybersecurity defenses and remain vigilant against this emerging threat.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...