🎯 LOT Newcomer Limited-Time Airdrop is Live!
Individual users can earn up to 1,000 LOT — share from a total prize pool of 1,000,000 LOT!
🏃 Join now: https://www.gate.com/campaigns/1294
Complete deposit and trading tasks to receive random LOT airdrops. Exclusive Alpha trading task await!🎯 LOT Newcomer Limited-Time Airdrop is Live!
Individual users can earn up to 1,000 LOT — share from a total prize pool of 1,000,000 LOT!
🏃 Join now: https://www.gate.com/campaigns/1294
Complete deposit and trading tasks to receive random LOT airdrops. Exclusive Alpha trading task await!
Anubis Ransomware Emerges With Rare Dual File Wipe And Encrypt Mode
HomeNews* An emerging Ransomware named Anubis has a destructive feature that can both encrypt and permanently erase victims’ files.
Anubis operates as a ransomware-as-a-service (RaaS). It runs an affiliate program with negotiable revenue splits, allowing affiliates to take as much as 80% of the ransom paid by victims. Alternative schemes for data extortion and access sales offer 60-40 and 50-50 splits, respectively. The researchers explain that Anubis affiliates use phishing emails to gain initial access, escalate user privileges, delete backup copies (called volume shadow copies), and then encrypt or wipe files. When in "wipe mode," file contents are destroyed, reducing their size to zero while leaving file names and extensions intact.
“The ransomware includes a wiper feature using /WIPEMODE parameter, which can permanently delete the contents of a file, preventing any recovery attempt,” Trend Micro noted. This dual-threat capability is considered rare and increases the likelihood of victims paying.
It is important to note that this Anubis ransomware has no connection to an Android banking trojan or to the FIN7 hacking group, which uses the same name for other malware.
In related developments, threat intelligence firm Recorded Future reported new infrastructure associated with FIN7, some of which pretends to be legitimate software products to spread the NetSupport RAT remote access tool. Distribution methods have included fake browser update pages and bogus download sites for software like 7-Zip.
Currently, only fake 7-Zip pages were found to be active as of April 2025, according to Recorded Future’s Insikt Group.