Cyber Security News

Researchers Uncover FIN7’s Stealthy Python-Based Anubis Backdoor

Researchers have recently discovered a sophisticated Python-based backdoor, known as the Anubis Backdoor, deployed by the notorious cybercrime group FIN7.

This advanced threat actor, active since at least 2015, has been responsible for billions of dollars in damages globally, primarily targeting the financial and hospitality sectors.

The Anubis Backdoor represents a significant evolution in FIN7’s tactics, leveraging Python to create a stealthy tool that blends seamlessly with legitimate system operations.

Python-Based Anubis BackdoorPython-Based Anubis Backdoor
Obfuscated Anubis Backdoor

Infection Vector and Obfuscation Techniques

The initial infection vector involves a seemingly innocuous ZIP archive containing multiple Python files, including a script named “conf.py.”

According to G Data Report, this archive is spread via phishing campaigns, highlighting FIN7’s continued reliance on social engineering tactics.

The conf.py script employs a multi-stage attack, utilizing AES encryption in CBC mode with padding, SHA-256 hashing, and Base64 encoding to obfuscate its malicious payload.

Implementation of the load function in conf.py

The script processes an obfuscated code string by splitting and decoding it, decrypting the content, writing it to a temporary file, executing it, and then deleting the file to minimize its footprint on disk.

Core Functionality and Persistence

The Anubis Backdoor’s core functionality includes network communication over HTTP ports (80/443), customizable server lists stored in the Windows Registry for persistence, and command execution capabilities through Python’s subprocess module.

It features a streamlined file upload mechanism, allowing attackers to deliver additional tools and malware to compromised systems.

The backdoor maintains persistence by storing its C2 configuration in the Windows Registry, encrypted using AES-CBC with a key derived from the agent ID and the victim’s computer name.

This makes each infection unique and difficult to decrypt without specific environmental knowledge.

Security Impact and Evolution

The Anubis Backdoor provides FIN7 with a flexible remote access tool capable of operating across Windows environments.

Its design demonstrates FIN7’s continued evolution in developing covert communication channels that blend with legitimate network traffic.

The combination of multi-layered obfuscation, encryption, and modular command structure gives threat actors significant capabilities, including complete shell access, file exfiltration, and dynamic control of C2 infrastructure.

These features, along with operational security measures to hinder analysis and detection, underscore the sophistication and adaptability of FIN7’s latest tool.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to disrupt…

19 hours ago

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code execution…

19 hours ago

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager Mobile…

19 hours ago

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular application…

19 hours ago

EU Targets Stark Industries in Cyberattack Sanctions Crackdown

The European Union has escalated its response to Russia’s ongoing campaign of hybrid threats, announcing…

23 hours ago

Venice.ai’s Unrestricted Access Sparks Concerns Over AI-Driven Cyber Threats

Venice.ai has rapidly emerged as a disruptive force in the AI landscape, positioning itself as…

24 hours ago