A new ransomware group, dubbed Anubis, has emerged as a significant threat in the cybersecurity landscape.
Active since late 2024, Anubis employs advanced techniques and operates across multiple platforms, including Windows, Linux, NAS, and ESXi environments.
The group is leveraging ransomware-as-a-service (RaaS) and other affiliate-based monetization models to expand its reach and impact.
Anubis ransomware is reportedly developed using the ChaCha+ECIES encryption algorithm, enabling robust data encryption.
It targets x64/x32 architectures across various environments while elevating privileges to NT AUTHORITY\SYSTEM for deeper system access.
The malware also features self-propagation capabilities, allowing it to encrypt entire domains efficiently.
These functionalities are managed via a user-friendly web panel designed for affiliates.
The group’s operations highlight a focus on critical industries, including healthcare and engineering sectors.
Their recent victims include organizations in Australia, Canada, Peru, and the United States.
Notably, two of their four confirmed victims belong to the healthcare sector, underscoring their potential focus on industries with sensitive data.
Anubis has introduced a range of affiliate programs to attract cybercriminal collaborators:
These programs reflect a well-structured business model aimed at maximizing profitability through multiple revenue streams.
According to Kela, Anubis operates with a high degree of sophistication.
Their tactics include publishing investigative articles about victims on hidden blog pages to pressure organizations into paying ransoms.
If negotiations fail, the group publicly releases stolen data on their blog or social media platforms.
They have also been observed notifying regulatory authorities and affected parties to amplify the pressure on victims.
The group’s representatives are active on Russian-speaking cybercrime forums such as RAMP and XSS under aliases like “superSonic” and “Anubis__media.”
Their posts suggest prior experience in ransomware operations, potentially as affiliates of other groups.
The emergence of Anubis underscores the evolving nature of ransomware threats.
Their technical expertise, combined with innovative business models and a focus on critical sectors, makes them a formidable adversary.
Organizations are advised to strengthen their cybersecurity defenses and remain vigilant against this emerging threat.
Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free
The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has been…
A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government, defense,…
Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency of…
In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working in…
The DragonForce ransomware group has launched a significant cyberattack on critical infrastructure in Saudi Arabia,…
In a concerning development, cybersecurity researchers at Trellix have uncovered a sophisticated malware campaign that…