Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Delivering securely on data and AI strategy 

    The Download: LLM confessions, and tapping into geothermal hot spots

    How AI is uncovering hidden geothermal energy resources

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Apple’s AI chief abruptly steps down

      December 3, 2025

      The issue that’s scrambling both parties: From the Politics Desk

      December 3, 2025

      More of Silicon Valley is building on free Chinese AI

      December 1, 2025

      From Steve Bannon to Elizabeth Warren, backlash erupts over push to block states from regulating AI

      November 23, 2025

      Insurance companies are trying to avoid big payouts by making AI safer

      November 19, 2025
    • Business

      Public GitLab repositories exposed more than 17,000 secrets

      November 29, 2025

      ASUS warns of new critical auth bypass flaw in AiCloud routers

      November 28, 2025

      Windows 11 gets new Cloud Rebuild, Point-in-Time Restore tools

      November 18, 2025

      Government faces questions about why US AWS outage disrupted UK tax office and banking firms

      October 23, 2025

      Amazon’s AWS outage knocked services like Alexa, Snapchat, Fortnite, Venmo and more offline

      October 21, 2025
    • Crypto

      HTX Research Releases New Report on Prediction Markets: From Structural Constraints to the Future of Attention-Based Financial Infrastructure

      December 4, 2025

      Monad (MON) Risks a Slide to Listing Lows as Big Players Walk Away — Last Hope At $0.028?

      December 4, 2025

      Peter Schiff to CZ: ‘Bitcoin Payments? They’re Just Liquidated Bets’

      December 4, 2025

      Tom Lee’s Relentless ETH Buying Puts BMNR Stock on a Possible 55% Breakout Path

      December 4, 2025

      Vienna Crypto Murder Shocks Europe as Kidnapping Wave Escalates

      December 4, 2025
    • Technology

      Delivering securely on data and AI strategy 

      December 4, 2025

      The Download: LLM confessions, and tapping into geothermal hot spots

      December 4, 2025

      How AI is uncovering hidden geothermal energy resources

      December 4, 2025

      Why the grid relies on nuclear reactors in the winter

      December 4, 2025

      Nvidia’s new RTX 50-series GPU driver restores PhysX support for popular games

      December 4, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Anubis ransomware adds wiper to destroy files beyond recovery
    Technology

    Anubis ransomware adds wiper to destroy files beyond recovery

    TechAiVerseBy TechAiVerseJune 15, 2025No Comments3 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Anubis ransomware adds wiper to destroy files beyond recovery
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Anubis ransomware adds wiper to destroy files beyond recovery

    The Anubis ransomware-as-a-service (RaaS) operation has added to its file-encryptimg malware a wiper module that destroys targeted files, making recovery impossible even if the ransom is paid.

    Anubis (not to be confused with the same-name Android malware with a ransomware module) is a relatively new RaaS first observed in December 2024 but became more active at the beginning of the year.

    On February 23, the operators announced an affiliate program on the RAMP forum.

    A report from KELA at the time explained that Anubis offered ransomware affiliates an 80% share of their proceeds. Data extortion affiliates were offered a 60%, and initial access brokers a 50% cut.

    Currently, Anubis’ extortion page on the dark web lists only eight victims, indicating that it could increase the attack volume once confidence in the technical aspect is strengthened.

    On that front, a Trend Micro report published yesterday contains evidence that the operators of Anubis are actively working on adding new features, an unusual one being a file-wiping function.

    The researchers found the wiper in the latest Anubis samples they dissected, and believe the feature was introduced to increase the pressure on the victim to pay quicker instead of stalling negotiations or ignoring them altogether.

    “What further sets Anubis apart from other RaaS and lends an edge to its operations is its use of a file wiping feature, designed to sabotage recovery efforts even after encryption,” explains Trend Micro.

    “This destructive tendency adds pressure on victims and raises the stakes of an already damaging attack.”

    The destructive behavior is activated using the command-line parameter ‘/WIPEMODE,’ which requires key-based authentication to issue.

    Anubis’ wipe mode
    Source: Trend Micro

    When activated, the wiper erases all file contents, reducing their sizes to 0 KB while keeping the filenames and structure intact.

    The victim will still see all files in the expected directories, but their contents will be irreversibly destroyed, making recovery impossible.

    Files before encryption (top) and after (bottom)
    Source: Trend Micro

    Trend Micro’s analysis reveals that Anubis supports several commands at launch, including for privilege elevation, directory exclusion, and target paths for encryption.

    Important system and program directories are excluded by default to avoid rendering the system completely unusable.

    The ransomware removes Volume Shadow Copies and terminates processes and services that could interfere with the encryption process.

    The encryption system uses ECIES (Elliptic Curve Integrated Encryption Scheme), and the researchers noted implementation similarities to EvilByte and Prince ransomware.

    The encrypted files are appended the ‘.anubis’ extension, an HTML ransom note is dropped on impacted directories, and the malware also performs an attempt (failed) to change the desktop wallpaper.

    The Anubis ransom note
    Source: Trend Micro

    Trend Micro observed that Anubis attacks begin with phishing emails that carry malicious links or attachments.

    The complete list of the indicators of compromise (IoCs) associated with Anubis attacks is available here.


    Why IT teams are ditching manual patch management

    Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore.

    In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work — no complex scripts required.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleWindows 11 users want these five features back
    Next Article WestJet investigates cyberattack disrupting internal systems
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Delivering securely on data and AI strategy 

    December 4, 2025

    The Download: LLM confessions, and tapping into geothermal hot spots

    December 4, 2025

    How AI is uncovering hidden geothermal energy resources

    December 4, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025474 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025162 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202584 Views

    Is Libby Compatible With Kobo E-Readers?

    March 31, 202563 Views
    Don't Miss
    Technology December 4, 2025

    Delivering securely on data and AI strategy 

    Delivering securely on data and AI strategy  Most organizations feel the imperative to keep pace…

    The Download: LLM confessions, and tapping into geothermal hot spots

    How AI is uncovering hidden geothermal energy resources

    Why the grid relies on nuclear reactors in the winter

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Delivering securely on data and AI strategy 

    December 4, 20250 Views

    The Download: LLM confessions, and tapping into geothermal hot spots

    December 4, 20250 Views

    How AI is uncovering hidden geothermal energy resources

    December 4, 20250 Views
    Most Popular

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    Volkswagen’s cheapest EV ever is the first to use Rivian software

    March 12, 20250 Views

    Startup studio Hexa acquires majority stake in Veevart, a vertical SaaS platform for museums

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.