Anubis Ransomware: A Destructive, Cross-Platform Threat

Anubis ransomware combines encryption and file-wiping capabilities, targeting Windows, Linux, and NAS systems with stealthy command-line execution and affiliate-driven campaigns across multiple industries.
Anubis Ransomware: A Destructive, Cross-Platform Threat
Table of Contents
    Add a header to begin generating the table of contents

    Overview

    Anubis is a newly emerged Ransomware-as-a-Service (RaaS) operator active since December 2024. It uniquely combines double‑extortion—encrypting and exfiltrating data—with an optional file-wiping mechanism (/WIPEMODE) that zeroes out files post-encryption, making recovery nearly impossible. Anubis targets Windows, Linux, NAS, and ESXi systems across sectors—including healthcare, construction, and hospitality—in Australia, Canada, Peru, the U.S., and beyond.

    Known Aliases

    • Sphinx (development codename)
    • superSonic (RAMP forum handle)
    • Anubis__media (XSS forum handle)

    Country of Origin

    • Likely Russian-speaking operators, based on affiliate posts on RAMP/XSS forum.

    Known Attacks & Victims

    • Dec 29, 2024 – First claimed victim: Pound Road Medical Centre, Australia.
    • ~7 victims listed on Anubis leak site by mid‑2025, including organizations in healthcare, construction, engineering, and hospitality across Australia, Canada, Peru, and the U.S, full details remains undisclosed.

    Common Infiltration Methods

    1. Spear‑phishing: Malicious attachments or links introducing executable payloads.
    2. Privilege elevation: Checks for admin rights; uses token manipulation to gain SYSTEM privileges.
    3. Shadow copy deletion: Removes recovery points before encryption.
    4. Execution options: Offers parameters like /KEY=, /elevated, /WIPEMODE, /PATH= for target control.
    5. File wiping: Executes wipe mode to zero files—while retaining names and structure—to deepen impact.

    MITRE ATT&CK Tactics & Techniques

    TacticTechniqueID
    Initial AccessPhishing via spear-phishing attachments/linksT1566
    ExecutionCommand and scripting interpreterT1059
    Defense EvasionValid AccountsT1078
    Privilege EscalationAccess Token ManipulationT1134.002
    Defense EvasionObfuscated files/informationT1027
    Defense EvasionDisabling shadow copiesT1070.004
    Defense EvasionSandbox/virtualization detectionT1497
    ImpactData encryption (ECIES algorithm; .anubis ext.)T1486
    ImpactData wiping (wipe mode parameter /WIPEMODE)

    Malware Strains Used

    • Anubis Ransomware – Modular cross-platform encryptor/wiper written in ChaCha+ECIES; supports Windows, Linux, NAS, ESXi.
    • Formerly known as Sphinx in early development stages.

    Indicators of Compromise (IOCs)

    File Extensions & Ransom Notes

    • Encrypted files: *.anubis
    • Ransom note: HTML files (e.g., README.html)

    Command-line Parameters

    Monitored operations include:

    swiftCopyEdit/KEY=<30+ alphanumeric> /WIPEMODE
    

    and flags for /elevated, /PATH=, /EXCLUDE=

    Behavioral Patterns

    IOC Handling in Trend Micro

    Trend Vision One detects API misuse patterns like:

    swiftCopyEditprocessCmd: /\/KEY=[A-Za-z0-9]{30,} \/(?:WIPEMODE|elevated)/ 

    Infrastructure

    • Affiliate handles: superSonic (RAMP), Anubis__media (XSS)

    Additional Details

    • Affiliate model: Offers revenue splits of 80% (ransomware), 60% (data extortion), 50% (access monetization).
    • Targets broad platforms: Supports Windows, Linux, NAS, ESXi; includes self-propagation across domains.
    • Forum presence: Operators active on Russian-speaking forums (“superSonic” on RAMP, “Anubis__media” on XSS).
    • Infrastructure leak site lists seven victims on onion blog; data extortion used to pressure payments.
    • Dual threat: Encryption coupled with destructive wiping raises stakes and potentially appeals to destructive affiliates or nation-state.

    Related Posts