Anubis Ransomware Introduces Wiper Mode That Destroys Data Even After Payment

Anubis Ransomware Introduces Wiper Mode That Destroys Data Even After Payment

A ransomware-as-a-service operation called Anubis is challenging a core assumption of ransomware response: that paying the ransom guarantees data recovery. The group has introduced an optional wiper mode that permanently destroys files, making decryption impossible regardless of payment.

First observed in late 2024, Anubis emerged on Russian-language cybercrime forums including RAMP and XSS. Code analysis links it to an earlier build known as Sphinx, indicating a direct rebrand rather than a new development effort.

Beyond Traditional Ransomware

What distinguishes Anubis from most ransomware families is its flexibility. The operation treats encryption, data theft, access resale, and data destruction as interchangeable tools rather than sequential steps.

Affiliates can choose between:

  • Standard file encryption with ransom demands
  • Data-only extortion without deploying ransomware
  • Selling compromised network access to other threat actors
  • Activating wiper mode to permanently destroy data

This model gives affiliates unprecedented control over how they monetize intrusions based on victim profile and operational risk.

Wiper Mode Changes the Calculus

When wiper mode is activated, files are overwritten rather than encrypted. Recovery becomes impossible even if the victim pays. This capability positions Anubis closer to destructive malware than traditional ransomware and significantly escalates risk for victims.

The inclusion of a wiper option may serve multiple purposes—punishing non-payment, creating urgency during negotiations, or enabling politically motivated destruction disguised as criminal activity.

Technical Operations

Anubis follows a manual, operator-controlled execution model. Affiliates deploy payloads only after achieving sufficient access, privileges, and data visibility inside target environments.

Initial access typically occurs through spear-phishing emails (T1566), exposed RDP services (T1133), compromised credentials (T1078), or trojanized software installers. The ransomware requires explicit command-line parameters to function (T1059), confirming it is designed for hands-on affiliate control rather than autonomous spread.

Once executed, Anubis attempts privilege escalation (T1548.002) and uses access token manipulation (T1134) to reach SYSTEM-level permissions. The malware then:

  • Terminates security tools, backup software, and database processes (T1562.001)
  • Deletes Volume Shadow Copies and disables Windows recovery options (T1490)
  • Removes system artifacts to hinder forensic analysis (T1070)
  • Encrypts files using hybrid ECIES cryptography, appending the .anubis extension (T1486)
  • Drops HTML ransom notes titled "RESTORE FILES.html" with Tor-based contact instructions

Data exfiltration (T1048, T1567) occurs before encryption using separate tools or legitimate transfer utilities. Stolen data is later leveraged through Anubis-operated Tor leak sites.

Targeting Patterns

Anubis consistently excludes former Soviet states, a behavior common among Russian-aligned RaaS operations. Activity has been observed across healthcare, engineering, and construction sectors in North America, Europe, and parts of Asia-Pacific—environments holding high-value or regulated data.

Affiliate Economics

The standard revenue split heavily favors affiliates, with approximately 80% of ransom proceeds going to operators handling the intrusion. Additional monetization channels include a data extortion program for standalone blackmail and an access broker channel for selling network access without deploying ransomware.

Indicators of Compromise

  • File extension: .anubis
  • Ransom note: RESTORE FILES.html
  • Binary type: Statically compiled Go payloads with in-memory decryption
  • Infrastructure: Tor-based leak sites and negotiation portals
  • Forum presence: RAMP, XSS

Defensive Recommendations

Organizations should prepare for scenarios where recovery may not be possible:

  • Maintain immutable or offline backups that cannot be deleted even with administrative privileges
  • Monitor for pre-encryption indicators including mass service termination, shadow copy deletion, and unusual outbound transfers
  • Enforce MFA on all remote access and administrative accounts
  • Prioritize patching for internet-facing services, especially RDP and VPN infrastructure
  • Prioritize early containment—waiting until encryption begins may be too late

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire