• Thread Author
Anubis ransomware has emerged as a formidable threat in the cybersecurity landscape, employing a destructive wiper module that ensures victims lose their data irretrievably, even if they comply with ransom demands. This evolution in ransomware tactics underscores the increasing sophistication and ruthlessness of cybercriminal operations.

The Emergence of Anubis Ransomware​

First detected in December 2024, Anubis ransomware has rapidly gained notoriety for its aggressive strategies. Unlike traditional ransomware that encrypts files and offers decryption keys upon payment, Anubis incorporates a wiper function that obliterates data, rendering recovery impossible. This approach not only amplifies the pressure on victims but also diminishes the likelihood of data restoration, even if the ransom is paid.

Technical Mechanisms and Attack Vectors​

Anubis utilizes the Elliptic Curve Integrated Encryption Scheme (ECIES) for encrypting files, appending the ".anubis" extension to affected files. The wiper module is activated via the command-line parameter '/WIPEMODE' with key-based authentication. Once triggered, it deletes file contents, reducing them to 0 KB, while preserving file names and directory structures. This deceptive tactic gives the illusion that files are intact when, in reality, their contents are irreversibly destroyed.
The ransomware is typically disseminated through phishing emails containing malicious links or attachments. Upon execution, Anubis attempts to escalate privileges, excludes specific directories from encryption to maintain system operability, deletes Volume Shadow Copies to prevent data recovery, and terminates processes that could interfere with its operations. Additionally, it often changes the desktop background to alert victims of the attack.

The Wiper Function: A Double-Edged Sword​

The integration of a wiper module into Anubis's arsenal represents a significant shift in ransomware tactics. By ensuring data destruction regardless of ransom payment, attackers aim to instill fear and urgency in victims. However, this strategy also undermines the traditional ransomware business model, which relies on the promise of data recovery upon payment. Victims, aware that their data is already destroyed, may be less inclined to pay, potentially reducing the attackers' financial gains.

Ransomware-as-a-Service (RaaS) Model and Operational Dynamics​

In February 2025, Anubis operators announced an affiliate program on the RAMP forum, offering substantial profit shares to collaborators: 80% for ransomware affiliates, 60% for data extortion, and 50% for initial access brokers. This Ransomware-as-a-Service (RaaS) model democratizes cybercrime, enabling individuals with varying skill levels to participate in ransomware campaigns. Despite its limited number of publicly known victims—eight listed on their dark web extortion site—the destructive nature of Anubis's attacks makes each incident particularly devastating.

Implications for Cybersecurity and Data Protection​

The advent of ransomware variants like Anubis necessitates a reevaluation of cybersecurity strategies. Traditional defenses may be insufficient against threats that not only encrypt but also destroy data. Organizations must adopt a multi-layered security approach, including:
  • Regular Data Backups: Maintain up-to-date backups stored offline or in secure cloud environments to facilitate data restoration without succumbing to ransom demands.
  • Employee Training: Educate staff on recognizing phishing attempts and other common attack vectors to reduce the risk of initial infection.
  • Advanced Threat Detection: Implement robust security solutions capable of detecting and mitigating ransomware activities before they can cause significant damage.
  • Incident Response Planning: Develop and regularly update incident response plans to ensure swift and effective action in the event of an attack.

The Ethical Dilemma of Ransom Payments​

Paying ransoms has always been a contentious issue. With Anubis's wiper functionality, the futility of payment becomes even more apparent. Reports indicate that even when victims pay, data recovery is not guaranteed. For instance, a study by Sophos revealed that only 8% of ransomware victims who paid the ransom recovered all their data, with an average recovery rate of 65% (blog.knowbe4.com). This underscores the unreliability of cybercriminals and the importance of proactive defense measures.

Conclusion​

Anubis ransomware exemplifies the evolving threat landscape, where attackers employ increasingly destructive methods to coerce victims. The incorporation of wiper modules signifies a departure from traditional ransomware tactics, challenging existing cybersecurity defenses and incident response strategies. Organizations must remain vigilant, continuously adapt their security postures, and prioritize data protection to mitigate the risks posed by such formidable threats.

Source: techzine.eu Even paying victims lose their data with Anubis ransomware