Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials

Posted on July 31, 2025August 1, 2025 By CWS

A complicated new ransomware menace has emerged from the cybercriminal underground, focusing on each Android and Home windows platforms with twin capabilities that stretch far past conventional file encryption.

Anubis ransomware, first recognized in November 2024, represents a regarding evolution in malware design, combining the damaging energy of ransomware with the credential-stealing strategies of banking trojans.

This cross-platform menace has quickly established itself as a big concern for cybersecurity professionals worldwide.

The malware’s emergence coincides with an alarming surge in ransomware exercise globally. In line with latest menace intelligence information, ransomware victims publicly listed on leak websites have elevated by almost 25%, whereas the variety of leak websites operated by ransomware teams has grown by 53%.

Anubis has contributed to those statistics by means of its aggressive focusing on of crucial infrastructure and high-value organizations throughout healthcare, development, {and professional} providers sectors.

Bitsight researchers recognized Anubis as a very harmful menace on account of its refined dual-platform method and damaging capabilities.

The ransomware group, noticed speaking in Russian on darkish net boards, has applied a particular Ransomware-as-a-Service mannequin with versatile affiliate cost constructions.

What units Anubis other than different ransomware households is its incorporation of everlasting information deletion capabilities, with some victims reporting full information loss even after ransom funds had been made.

The malware’s assault methodology begins with fastidiously crafted spear-phishing campaigns that ship malicious payloads by means of trusted-appearing e-mail communications.

On Android units, Anubis features primarily as a banking trojan, deploying phishing overlays that mimic authentic utility interfaces to reap consumer credentials.

The malware concurrently conducts display screen recording and keylogging operations to seize delicate authentication information, whereas propagating itself by means of the sufferer’s contact checklist by way of mass SMS distribution.

Superior Execution and Persistence Mechanisms

Anubis demonstrates refined technical capabilities in its execution part, significantly by means of its use of configurable command-line parameters that allow menace actors to customise assault situations.

The malware employs particular command parameters together with /KEY=, /elevated, /PATH=, /PFAD=, and /WIPEMODE, permitting operators to regulate encryption processes, privilege escalation, goal directories, and damaging wiping performance.

On Home windows methods, the ransomware implements the Elliptic Curve Built-in Encryption Scheme (ECIES) for file encryption, offering sturdy cryptographic safety that makes unauthorized decryption extraordinarily troublesome.

The malware systematically eliminates restoration choices by deleting Quantity Shadow Copies and terminating crucial system providers, whereas concurrently escalating privileges by means of entry token manipulation strategies.

This multi-layered method ensures most influence whereas stopping victims from using customary restoration mechanisms, forcing organizations into troublesome choices relating to ransom cost versus everlasting information loss.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Android, Anubis, Attacking, Credentials, Encrypt, Files, Login, Ransomware, Steal, Users, Windows

Post navigation

Previous Post: First AI-Powered Malware LAMEHUG Attacking Organizations With Compromised Official Email Account
Next Post: Silver Fox Hackers Using Weaponized Google Translate Tools to Deploy Windows Malware

Related Posts

UK Sanctions Russian APT 28 Hackers for Attacking Microsoft Cloud Service Login Details Cyber Security News
How to Use Threat Intelligence to Enhance Cybersecurity Operations Cyber Security News
Cybersecurity Newsletter Weekly Recap – UK Hacker Bust to BMW Data Leak Cyber Security News
Microsoft Azure Cloud Disrupted by Undersea Cable Cuts in Red Sea Cyber Security News
Microsoft Defender for Office 365 to Block Email Bombing Attacks Cyber Security News
Global Jewellery Brand Pandora Suffers Hacked Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News