Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials

Posted on July 31, 2025August 1, 2025 By CWS

A complicated new ransomware menace has emerged from the cybercriminal underground, focusing on each Android and Home windows platforms with twin capabilities that stretch far past conventional file encryption.

Anubis ransomware, first recognized in November 2024, represents a regarding evolution in malware design, combining the damaging energy of ransomware with the credential-stealing strategies of banking trojans.

This cross-platform menace has quickly established itself as a big concern for cybersecurity professionals worldwide.

The malware’s emergence coincides with an alarming surge in ransomware exercise globally. In line with latest menace intelligence information, ransomware victims publicly listed on leak websites have elevated by almost 25%, whereas the variety of leak websites operated by ransomware teams has grown by 53%.

Anubis has contributed to those statistics by means of its aggressive focusing on of crucial infrastructure and high-value organizations throughout healthcare, development, {and professional} providers sectors.

Bitsight researchers recognized Anubis as a very harmful menace on account of its refined dual-platform method and damaging capabilities.

The ransomware group, noticed speaking in Russian on darkish net boards, has applied a particular Ransomware-as-a-Service mannequin with versatile affiliate cost constructions.

What units Anubis other than different ransomware households is its incorporation of everlasting information deletion capabilities, with some victims reporting full information loss even after ransom funds had been made.

The malware’s assault methodology begins with fastidiously crafted spear-phishing campaigns that ship malicious payloads by means of trusted-appearing e-mail communications.

On Android units, Anubis features primarily as a banking trojan, deploying phishing overlays that mimic authentic utility interfaces to reap consumer credentials.

The malware concurrently conducts display screen recording and keylogging operations to seize delicate authentication information, whereas propagating itself by means of the sufferer’s contact checklist by way of mass SMS distribution.

Superior Execution and Persistence Mechanisms

Anubis demonstrates refined technical capabilities in its execution part, significantly by means of its use of configurable command-line parameters that allow menace actors to customise assault situations.

The malware employs particular command parameters together with /KEY=, /elevated, /PATH=, /PFAD=, and /WIPEMODE, permitting operators to regulate encryption processes, privilege escalation, goal directories, and damaging wiping performance.

On Home windows methods, the ransomware implements the Elliptic Curve Built-in Encryption Scheme (ECIES) for file encryption, offering sturdy cryptographic safety that makes unauthorized decryption extraordinarily troublesome.

The malware systematically eliminates restoration choices by deleting Quantity Shadow Copies and terminating crucial system providers, whereas concurrently escalating privileges by means of entry token manipulation strategies.

This multi-layered method ensures most influence whereas stopping victims from using customary restoration mechanisms, forcing organizations into troublesome choices relating to ransom cost versus everlasting information loss.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Android, Anubis, Attacking, Credentials, Encrypt, Files, Login, Ransomware, Steal, Users, Windows

Post navigation

Previous Post: First AI-Powered Malware LAMEHUG Attacking Organizations With Compromised Official Email Account
Next Post: Silver Fox Hackers Using Weaponized Google Translate Tools to Deploy Windows Malware

Related Posts

glibc Vulnerability Exposes Millions of Linux Systems to Code Execution Attacks Cyber Security News
Fire Ant Hackers Exploiting Vulnerabilities in VMware ESXi and vCenter Cyber Security News
Tor Adopts Galois Onion Encryption to Strengthen Defense Against Online Attacks Cyber Security News
OceanLotus Hacker Group Targeting Xinchuang IT Ecosystems to Launch Supply Chain Attacks Cyber Security News
New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials Cyber Security News
New Wave of Steganography Attacks: Hackers Hiding XWorm in PNGs  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark