Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials

What sets Anubis apart from other ransomware families is its incorporation of permanent data deletion capabilities, with some victims reporting complete data loss even after ransom payments were made. A sophisticated new ransomware threat has emerged from the cybercriminal underground, targeting both Android and Windows platforms with dual capabilities that extend far beyond traditional file encryption. Anubis ransomware, first identified in November 2024, represents a concerning evolution in malware design, combining the destructive power of ransomware with the credential-stealing techniques of banking trojans. According to recent threat intelligence data, ransomware victims publicly listed on leak sites have increased by nearly 25%, while the number of leak sites operated by ransomware groups has grown by 53%. This multi-layered approach ensures maximum impact while preventing victims from utilizing standard recovery mechanisms, forcing organizations into difficult decisions regarding ransom payment versus permanent data loss. Anubis demonstrates sophisticated technical capabilities in its execution phase, particularly through its use of configurable command-line parameters that enable threat actors to customize attack scenarios. The malware employs specific command parameters including /KEY=, /elevated, /PATH=, /PFAD=, and /WIPEMODE, allowing operators to control encryption processes, privilege escalation, target directories, and destructive wiping functionality. On Windows systems, the ransomware implements the Elliptic Curve Integrated Encryption Scheme (ECIES) for file encryption, providing robust cryptographic protection that makes unauthorized decryption extremely difficult. Bitsight researchers identified Anubis as a particularly dangerous threat due to its sophisticated dual-platform approach and destructive capabilities. The malware systematically eliminates recovery options by deleting Volume Shadow Copies and terminating critical system services, while simultaneously escalating privileges through access token manipulation techniques. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. The malware simultaneously conducts screen recording and keylogging operations to capture sensitive authentication data, while propagating itself through the victim’s contact list via mass SMS distribution. The ransomware group, observed communicating in Russian on dark web forums, has implemented a distinctive Ransomware-as-a-Service model with flexible affiliate payment structures. Anubis has contributed to these statistics through its aggressive targeting of critical infrastructure and high-value organizations across healthcare, construction, and professional services sectors. On Android devices, Anubis functions primarily as a banking trojan, deploying phishing overlays that mimic legitimate application interfaces to harvest user credentials.

This Cyber News was published on cybersecuritynews.com. Publication date: Fri, 01 Aug 2025 00:00:21 +0000


Cyber News related to Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials

10 Best Ransomware Protection Tools - 2025 - It protects devices from ransomware and other cyber threats using advanced threat intelligence, behavioral analysis, and cloud-based technology. It monitors and prevents ransomware assaults on personal files and automatically restores encrypted ...
5 months ago Cybersecuritynews.com
10 Best Ransomware File Decryptor Tools in 2025 - Kaspersky Rakhni Decryptor contains different decryption tools based on various versions of Rakhni ransomware and helps you decrypt encrypted files on your system. PyLocky Ransomware Decryption Tool is a free and open source developed and released by ...
4 months ago Cybersecuritynews.com
Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials - What sets Anubis apart from other ransomware families is its incorporation of permanent data deletion capabilities, with some victims reporting complete data loss even after ransom payments were made. A sophisticated new ransomware threat has emerged ...
1 week ago Cybersecuritynews.com
Hive Ransomware: A Detailed Analysis - This past week, on January 26th, to be exact, the FBI successfully shut down the Hive ransomware group and saved victims over a hundred million dollars in ransom payments and remediation costs. As ransomware continues to be a national security threat ...
2 years ago Heimdalsecurity.com LockBit
DragonForce and Anubis Ransomware Operators Unveils New Affiliate Models - Unlike traditional ransomware operations focused solely on encryption, Anubis offers three distinct extortion options with varying profit-sharing models, significantly diversifying their attack methodology and potential victim impact. The third and ...
3 months ago Cybersecuritynews.com Dragonforce
Ransomware Roundup - The Ransomware Roundup report aims to provide readers with brief insights into the evolving ransomware landscape and the Fortinet solutions that protect against those variants. This edition of the Ransomware Roundup covers the 8base ransomware. 8base ...
1 year ago Feeds.fortinet.com 8base
Ransomware groups test new business models to hit more victims, increase profits | The Record from Recorded Future News - While this type of extortion is not completely novel, with AlphV/BlackCat reportedly disclosing an incident to the U.S. Securities and Exchange Commission after a victim refused to make a ransom payment, Secureworks said it has not seen other ...
3 months ago Therecord.media LockBit Dragonforce
The Top 10 Ransomware Groups of 2023 - This article takes an in-depth look at the rise in ransomware attacks over the past year and the criminal groups driving the surge in cyber extortion. LockBit has established itself as one of the most notorious ransomware operations since emerging on ...
1 year ago Securityboulevard.com TA505 8base LockBit BianLian Medusa Noescape Black Basta
Medusa Ransomware Turning Your Files into Stone - Unit 42 Threat Intelligence analysts have noticed an escalation in Medusa ransomware activities and a shift in tactics toward extortion, characterized by the introduction in early 2023 of their dedicated leak site called the Medusa Blog. The Unit 42 ...
1 year ago Unit42.paloaltonetworks.com Medusa
Ransomware Roundup - On a bi-weekly basis, FortiGuard Labs gathers data on ransomware variants of interest that have been gaining traction within our datasets and the OSINT community. The Ransomware Roundup report aims to provide readers with brief insights into the ...
1 year ago Feeds.fortinet.com
Linux version of Qilin ransomware focuses on VMware ESXi - A sample of the Qilin ransomware gang's VMware ESXi encryptor has been found and it could be one of the most advanced and customizable Linux encryptors seen to date. Due to this adoption, almost all ransomware gangs have created dedicated VMware ESXi ...
1 year ago Bleepingcomputer.com Qilin
The Week in Ransomware - Attacks on hospitals continued this week, with ransomware operations disrupting patient care as they force organization to respond to cyberattacks. While many, like LockBit, claim to have policies in place to avoid encryping hospitals, we continue to ...
1 year ago Bleepingcomputer.com LockBit Cactus
Ransomware trends and recovery strategies companies should know - Ransomware attacks can have severe consequences, causing financial losses, reputational damage, and operational disruptions. The methods used to deliver ransomware vary, including phishing emails, malicious websites, and exploiting vulnerabilities in ...
1 year ago Helpnetsecurity.com
Top 10 Notorious Ransomware Gangs of 2023 - By employing a multitude of advanced techniques like double extortion along with other illicit tactics, ransomware groups are continually evolving at a rapid pace. Here below, we have mentioned all the types of ransomware used by the threat actors ...
1 year ago Cybersecuritynews.com LockBit BianLian Everest Ragnar Locker Black Basta
Key Group uses leaked builders of ransomware and wipers | Securelist - The first discovered sample of Key Group, the Xorist ransomware, established persistence in the system by changing file extension associations. The .huis_bn extension added to encrypted files in the early versions of Key Group samples, Xorist and ...
10 months ago Securelist.com
January 2024's Most Wanted Malware: Major VexTrio Broker Operation Uncovered and Lockbit3 Tops the Ransomware Threats - LockBit3 topped the list of active ransomware groups and Education was the most impacted industry worldwide. LockBit3 was named the most prevalent ransomware group in a newly introduced ranking in the Index, and Education remained the most impacted ...
1 year ago Blog.checkpoint.com 8base LockBit
Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware - The Cisco Talos Year in Review report released Tuesday highlights new trends in the cybersecurity threat landscape. We'll focus on three topics covered: the ransomware cybercriminal ecosystem, network infrastructure attacks and commodity loader ...
1 year ago Techrepublic.com LockBit
Targeting homeowners' data - As these companies obtain a large amount of sensitive information from their customers, they become attractive targets for ransomware gangs to conduct double-extortion attacks. Finland is also warning of Akira ransomware increasingly targeting ...
1 year ago Bleepingcomputer.com LockBit Akira
How ransomware gangs are engaging - As ransomware gangs continue to market themselves as legitimate businesses complete with customer service representatives, new research from Sophos showed that threat actors are expanding public relations efforts to further pressure victims into ...
1 year ago Techtarget.com LockBit Snatch
The Week in Ransomware - Earlier this month, the BlackCat/ALPHV ransomware operation suffered a five-day disruption to their Tor data leak and negotiation sites, rumored to be caused by a law enforcement action. The FBI revealed this week that they hacked the BlackCat/ALPHV ...
1 year ago Bleepingcomputer.com LockBit Akira Noescape
Ransomware's Impact May Include Heart Attacks, Strokes & PTSD - First-order harms: Direct targets of ransomware attacks. The increasing convergence of IT and OT leave physical infrastructures more vulnerable to ransomware, even though most ransomware operators lack the capability to directly compromise OT or ...
1 year ago Techrepublic.com
Ransomware Roundup - On a bi-weekly basis, FortiGuard Labs gathers data on ransomware variants of interest that have been gaining traction within our datasets and the OSINT community. The Ransomware Roundup report aims to provide readers with brief insights into the ...
1 year ago Feeds.fortinet.com
Ransomware in 2023 recap: 5 key takeaways - This provides the best overall picture of ransomware activity, but the true number of attacks is far higher. While some ransomware trends hardly changed over the last year, such as LockBit's continued dominance, ransomware criminals also challenged ...
1 year ago Malwarebytes.com Scattered Spider LockBit
VX-Underground malware collective framed by Phobos ransomware - A new Phobos ransomware variant frames the popular VX-Underground malware-sharing collective, indicating the group is behind attacks using the encryptor. Phobos launched in 2018 in what is believed to be a ransomware-as-a-service derived from the ...
1 year ago Bleepingcomputer.com Qilin Cactus Black Basta
The Week in Ransomware - This week was pretty quiet on the ransomware front, with most of the attention on the seizure of the BreachForums data theft forum. That does not mean there was nothing of interest released this week about ransomware. A report by CISA said that the ...
1 year ago Bleepingcomputer.com LockBit Inc ransom Black Basta