newstrooper newstrooper
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Reading: Anubis ransomware encrypts and wipes files, making recovery impossible even after payment
Share

News Trooper

Your Global Insight, Delivered Daily.

Search
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Follow US
© 2025 All Rights Reserved | Powered by News Trooper News
News Trooper > Technology > Anubis ransomware encrypts and wipes files, making recovery impossible even after payment
Technology

Anubis ransomware encrypts and wipes files, making recovery impossible even after payment

June 16, 2025 4 Min Read
Share
Anubis ransomware encrypts and wipes files, making recovery impossible even after payment
SHARE

New ransomware stocks have been discovered and include the ability to not only encrypt files, but also permanently erase them. This is a development called “rare dual threats.”

“Ransomware has a ‘wipe mode’ that permanently erases files, making recovery impossible even if ransom is paid,” micro-researchers Maristel Polisulpio, Sarah Pearl Camilling and Sofia Nilletto Robles said in a report released last week.

The operation as a ransomware assiasia in question was named Anubis, which became active in December 2024, and claiming victims of the healthcare, hospitality and construction sectors of Australia, Canada, Peru and early US analyses, suggesting that the developers cited Spinks before they symbolized the first version.

It is worth noting that the electronic crime crew has nothing to do with the Python-based backdoor, the same name as the Android Banking Trojan.

“Anubis runs a flexible affiliate program, provides negotiable revenue splits and supports additional monetization passes such as data forced and access sales,” the cybersecurity company said.

The affiliate program follows an 80-20 split, allowing affiliate actors to pay 80% of the ransom. Meanwhile, the data coercion and access monetization scheme offer 60-40 and 50-50 splits, respectively.

The attack chain attached to Anubis involves using phishing emails as the initial access vector. Threat actors will use their scaffolding to escalate privileges, carry out reconnaissance, take steps to remove volume shadow copies, and wipe content as needed.

This means that while the file name or its extension is left untouched, the file size will be reduced to 0 kb, making recovery impossible, and therefore putting more pressure on the victim to pay.

See also  More than 70 organizations in multiple sectors targeted by China-linked cyberspy groups

“The ransomware includes a wiper feature using the /wipemode parameter, which permanently removes the contents of the file and prevents attempts to recover,” the researchers said.

“The ability to encrypt and destroy data forever greatly increases the interests of victims and amplifies pressure to comply, as intended for the operation of powerful ransomware.”

The discovery of Anubis’ disruptive behavior comes when future detailed new infrastructure related to FIN7 groups impersonating legitimate software products and services is recorded as part of a campaign designed to provide NetSupport Rat.

The threat intelligence company owned by MasterCard said it has identified three unique distribution vectors over the past year employing Bogus browser update pages, a fake 7-ZIP download site, and TAG-124 (aka 404 TDS, Chaya_002, Kongtuke, Landupdate808) to deliver malware.

The fake browser update method loads a custom loader mask bat to run the remote access trojan, but the remaining two infected vectors use another custom PowerShell loader that compresses it and runs it.

“(Maskbat) is similar to FakeBat, but it is obfuscated and contains a string linked to Grayalpha,” said Future’s Insikt group. “We observed that all three infected vectors were used simultaneously, but at the time of writing, only the fake 7-ZIP download page was still active, showing the newly registered domain in April 2025.”

Share This Article
Facebook Twitter Copy Link
Previous Article All Monopoly Go Events, Tournaments, Dates and Rewards – June 2025 All Monopoly Go Events, Tournaments, Dates and Rewards – June 2025
Next Article German court ruling Syrian torture doctor sentences life in prison German court ruling Syrian torture doctor sentences life in prison
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular News

Musk’s decision to limit political spending leaves some Republicans cold

Musk’s decision to limit political spending leaves some Republicans cold

Elon Musk's pledge to retreat from campaign spending -- if…

June 2, 2025
GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

McKinnack Island, Mich. -- Republican Rep. Bill Huizenga is preparing…

June 2, 2025
'It betrays our values': Progressives grapple with deadly shooting

'It betrays our values': Progressives grapple with deadly shooting

Progressive is tackling that two people who worked at the…

June 2, 2025
Beshear, Khanna to headline Dem mayor summit in July

Beshear, Khanna to headline Dem mayor summit in July

Two potential 2028 presidential primary candidates will descend on Cleveland…

June 2, 2025
Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

24 hours after Sunday's announcement that former President Joe Biden…

June 2, 2025

You Might Also Like

Pre-installed apps on ulefone, krüger, matz phones reset the device to reset apps and stole the pin
Technology

Pre-installed apps on ulefone, krüger, matz phones reset the device to reset apps and stole the pin

2 Min Read
Apple Zero-Clock flaws in messages abused by journalist spies using Paragon Spyware
Technology

Apple Zero-Clock flaws in messages abused by journalist spies using Paragon Spyware

7 Min Read
Researchers detail the evolving tactics of bitter apt as its geographical extent expands
Technology

Researchers detail the evolving tactics of bitter apt as its geographical extent expands

5 Min Read
295 Malicious IPS launches a coordinated brute force attack against ApacheTomcat manager
Technology

295 Malicious IPS launches a coordinated brute force attack against ApacheTomcat manager

3 Min Read
newstrooper
newstrooper

Welcome to News Trooper, your reliable destination for global news that matters. In an age of information overload, we stand as a dedicated news platform committed to delivering timely, accurate, and insightful coverage of the world’s most significant events and trends.

  • Business
  • Entertainment
  • Gaming
  • Politics
  • Sports
  • Technology
  • Travel
  • World News
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2025 All Rights Reserved | Powered by News Trooper News

Welcome Back!

Sign in to your account

Lost your password?