Tuesday, March 25, 2025
Homecyber securityFully Undetected Anubis Malware Enables Hackers to Execute Remote Commands

Fully Undetected Anubis Malware Enables Hackers to Execute Remote Commands

Published on

SIEM as a Service

Follow Us on Google News

A recent alert has highlighted the emergence of the AnubisBackdoor, a Python-based backdoor attributed to the Savage Ladybug group, which is reportedly linked to the notorious FIN7 cybercrime gang.

This malware is designed to provide remote access, execute commands, and facilitate data exfiltration, all while evading detection by most antivirus solutions.

Technical Analysis

The AnubisBackdoor is part of a broader trend of sophisticated malware tools being developed and deployed by cybercrime groups.

Unlike the Anubis malware, which is primarily known for targeting Android devices with banking trojan capabilities, the AnubisBackdoor is specifically tailored for remote command execution and system compromise on other platforms.

It features mild obfuscation techniques, making it fully undetected (FUD) by many security tools.

This level of stealth allows threat actors to use it effectively in malspam campaigns, further compromising systems and stealing sensitive data.

The Savage Ladybug group’s use of the AnubisBackdoor underscores the evolving tactics of cybercrime groups like FIN7, which have historically been known for their advanced evasion techniques and tool development.

FIN7, also known as Carbanak, has been active since at least 2013 and has employed a range of tools, including the Carbanak backdoor and the AvNeutralizer tool, which is designed to disable endpoint detection and response (EDR) solutions.

The development and deployment of the AnubisBackdoor suggest that these groups continue to innovate and adapt their strategies to evade detection and maximize the impact of their attacks.

Indicators of Compromise (IOCs)

According to the Report, To combat the AnubisBackdoor, security teams are advised to monitor for specific indicators of compromise (IOCs), including backend server IP addresses such as 38.134.148.20, 5.252.177.249, 212.224.107.203, and 195.133.67.35.

Additionally, file hashes like 03a160127cce3a96bfa602456046cc443816af7179d771e300fec80c5ab9f00f and 5203f2667ab71d154499906d24f27f94e3ebdca4bba7fe55fe490b336bad8919 should be flagged for potential malicious activity.

As the threat landscape continues to evolve, it is crucial for organizations to enhance their security posture by implementing robust detection and response strategies to counter such sophisticated malware threats.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Researchers Compare Malware Development in Rust vs C and C++

Security researcher Nick Cerne from Bishop Fox has published findings comparing malware development in...

ARACNE: LLM-Powered Pentesting Agent Executes Commands on Real Linux Shell Systems

Researchers have introduced ARACNE, a fully autonomous Large Language Model (LLM)-based pentesting agent designed...

IDT Corporation Partners with AccuKnox for Zero Trust Runtime IoT/Edge Security

Menlo Park, United States, March 25th, 2025, CyberNewsWireFinTech and Communications Leader, IDT Corporation partners with AccuKnox to deploy...

New Phishing Campaign Targets Mac Users to Steal Login Credentials

A sophisticated phishing campaign, recently identified by LayerX Labs, has shifted its focus from...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Researchers Compare Malware Development in Rust vs C and C++

Security researcher Nick Cerne from Bishop Fox has published findings comparing malware development in...

ARACNE: LLM-Powered Pentesting Agent Executes Commands on Real Linux Shell Systems

Researchers have introduced ARACNE, a fully autonomous Large Language Model (LLM)-based pentesting agent designed...

New Phishing Campaign Targets Mac Users to Steal Login Credentials

A sophisticated phishing campaign, recently identified by LayerX Labs, has shifted its focus from...