Friday, March 21, 2025
Homecyber securityResearchers Uncover FIN7's Stealthy Python-Based Anubis Backdoor

Researchers Uncover FIN7’s Stealthy Python-Based Anubis Backdoor

Published on

SIEM as a Service

Follow Us on Google News

Researchers have recently discovered a sophisticated Python-based backdoor, known as the Anubis Backdoor, deployed by the notorious cybercrime group FIN7.

This advanced threat actor, active since at least 2015, has been responsible for billions of dollars in damages globally, primarily targeting the financial and hospitality sectors.

The Anubis Backdoor represents a significant evolution in FIN7’s tactics, leveraging Python to create a stealthy tool that blends seamlessly with legitimate system operations.

Python-Based Anubis Backdoor
Obfuscated Anubis Backdoor

Infection Vector and Obfuscation Techniques

The initial infection vector involves a seemingly innocuous ZIP archive containing multiple Python files, including a script named “conf.py.”

According to G Data Report, this archive is spread via phishing campaigns, highlighting FIN7’s continued reliance on social engineering tactics.

The conf.py script employs a multi-stage attack, utilizing AES encryption in CBC mode with padding, SHA-256 hashing, and Base64 encoding to obfuscate its malicious payload.

Python-Based Anubis Backdoor
Implementation of the load function in conf.py

The script processes an obfuscated code string by splitting and decoding it, decrypting the content, writing it to a temporary file, executing it, and then deleting the file to minimize its footprint on disk.

Core Functionality and Persistence

The Anubis Backdoor’s core functionality includes network communication over HTTP ports (80/443), customizable server lists stored in the Windows Registry for persistence, and command execution capabilities through Python’s subprocess module.

It features a streamlined file upload mechanism, allowing attackers to deliver additional tools and malware to compromised systems.

The backdoor maintains persistence by storing its C2 configuration in the Windows Registry, encrypted using AES-CBC with a key derived from the agent ID and the victim’s computer name.

This makes each infection unique and difficult to decrypt without specific environmental knowledge.

Security Impact and Evolution

The Anubis Backdoor provides FIN7 with a flexible remote access tool capable of operating across Windows environments.

Its design demonstrates FIN7’s continued evolution in developing covert communication channels that blend with legitimate network traffic.

The combination of multi-layered obfuscation, encryption, and modular command structure gives threat actors significant capabilities, including complete shell access, file exfiltration, and dynamic control of C2 infrastructure.

These features, along with operational security measures to hinder analysis and detection, underscore the sophistication and adaptability of FIN7’s latest tool.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware

In a recent surge of sophisticated cyberattacks, threat actors have been utilizing fake CAPTCHA...

Researchers Reveal macOS Vulnerability Exposing System Passwords

A recent article by Noah Gregory has highlighted a significant vulnerability in macOS, identified...

JumpServer Flaws Allow Attackers to Bypass Authentication and Gain Full Control

JumpServer, a widely used open-source Privileged Access Management (PAM) tool developed by Fit2Cloud, has...

Hackers Use Fake Meta Emails to Steal Ad Account Credentials

A recent phishing campaign uncovered by the Cofense Phishing Defense Center (PDC) has been...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware

In a recent surge of sophisticated cyberattacks, threat actors have been utilizing fake CAPTCHA...

Researchers Reveal macOS Vulnerability Exposing System Passwords

A recent article by Noah Gregory has highlighted a significant vulnerability in macOS, identified...

JumpServer Flaws Allow Attackers to Bypass Authentication and Gain Full Control

JumpServer, a widely used open-source Privileged Access Management (PAM) tool developed by Fit2Cloud, has...