Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials

Posted on July 31, 2025August 1, 2025 By CWS

A complicated new ransomware menace has emerged from the cybercriminal underground, focusing on each Android and Home windows platforms with twin capabilities that stretch far past conventional file encryption.

Anubis ransomware, first recognized in November 2024, represents a regarding evolution in malware design, combining the damaging energy of ransomware with the credential-stealing strategies of banking trojans.

This cross-platform menace has quickly established itself as a big concern for cybersecurity professionals worldwide.

The malware’s emergence coincides with an alarming surge in ransomware exercise globally. In line with latest menace intelligence information, ransomware victims publicly listed on leak websites have elevated by almost 25%, whereas the variety of leak websites operated by ransomware teams has grown by 53%.

Anubis has contributed to those statistics by means of its aggressive focusing on of crucial infrastructure and high-value organizations throughout healthcare, development, {and professional} providers sectors.

Bitsight researchers recognized Anubis as a very harmful menace on account of its refined dual-platform method and damaging capabilities.

The ransomware group, noticed speaking in Russian on darkish net boards, has applied a particular Ransomware-as-a-Service mannequin with versatile affiliate cost constructions.

What units Anubis other than different ransomware households is its incorporation of everlasting information deletion capabilities, with some victims reporting full information loss even after ransom funds had been made.

The malware’s assault methodology begins with fastidiously crafted spear-phishing campaigns that ship malicious payloads by means of trusted-appearing e-mail communications.

On Android units, Anubis features primarily as a banking trojan, deploying phishing overlays that mimic authentic utility interfaces to reap consumer credentials.

The malware concurrently conducts display screen recording and keylogging operations to seize delicate authentication information, whereas propagating itself by means of the sufferer’s contact checklist by way of mass SMS distribution.

Superior Execution and Persistence Mechanisms

Anubis demonstrates refined technical capabilities in its execution part, significantly by means of its use of configurable command-line parameters that allow menace actors to customise assault situations.

The malware employs particular command parameters together with /KEY=, /elevated, /PATH=, /PFAD=, and /WIPEMODE, permitting operators to regulate encryption processes, privilege escalation, goal directories, and damaging wiping performance.

On Home windows methods, the ransomware implements the Elliptic Curve Built-in Encryption Scheme (ECIES) for file encryption, offering sturdy cryptographic safety that makes unauthorized decryption extraordinarily troublesome.

The malware systematically eliminates restoration choices by deleting Quantity Shadow Copies and terminating crucial system providers, whereas concurrently escalating privileges by means of entry token manipulation strategies.

This multi-layered method ensures most influence whereas stopping victims from using customary restoration mechanisms, forcing organizations into troublesome choices relating to ransom cost versus everlasting information loss.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Android, Anubis, Attacking, Credentials, Encrypt, Files, Login, Ransomware, Steal, Users, Windows

Post navigation

Previous Post: First AI-Powered Malware LAMEHUG Attacking Organizations With Compromised Official Email Account
Next Post: Silver Fox Hackers Using Weaponized Google Translate Tools to Deploy Windows Malware

Related Posts

Livewire Vulnerability Exposes Millions of Laravel Apps to Remote Code Execution Attacks Cyber Security News
DSPM vs. DLP : Understanding the Key Differences Cyber Security News
“CitrixBleed 2” Vulnerability PoC Released Cyber Security News
Splunk Details on How to Detect, Mitigate and Respond to CitrixBleed 2 Attack Cyber Security News
AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods Cyber Security News
Google Chrome May Soon Turn Webpages Into Podcasts With AI Audio Overviews Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure a NAS (Network Attached Storage)
  • Cybersecurity News Recap – Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack
  • How to Safely Use Free Wi-Fi at Cafes and Airports
  • CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign
  • New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Secure a NAS (Network Attached Storage)
  • Cybersecurity News Recap – Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack
  • How to Safely Use Free Wi-Fi at Cafes and Airports
  • CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign
  • New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News