Anubis Ransomware: A Dual-Platform Menace Targeting Android and Windows Users

In the ever-evolving landscape of cyber threats, a new and formidable adversary has surfaced: Anubis ransomware. First detected in November 2024, Anubis distinguishes itself by simultaneously targeting Android and Windows platforms, merging the destructive capabilities of traditional ransomware with the stealthy credential-stealing techniques characteristic of banking trojans. This dual-platform approach has rapidly escalated Anubis to a significant concern among cybersecurity professionals worldwide.

Global Surge in Ransomware Activity

The emergence of Anubis coincides with a notable uptick in ransomware incidents globally. Recent threat intelligence reports indicate a nearly 25% increase in victims listed on public leak sites, alongside a 53% rise in the number of leak sites operated by ransomware groups. Anubis has notably contributed to these statistics through its aggressive targeting of critical infrastructure and high-value organizations across sectors such as healthcare, construction, and professional services.

Anubis: A Sophisticated Threat

Researchers from Bitsight have identified Anubis as a particularly dangerous threat due to its sophisticated dual-platform approach and destructive capabilities. The ransomware group, observed communicating in Russian on dark web forums, has implemented a distinctive Ransomware-as-a-Service (RaaS) model with flexible affiliate payment structures. This model allows affiliates to customize their attack strategies, thereby broadening the reach and impact of Anubis.

Unique Destructive Capabilities

What sets Anubis apart from other ransomware families is its incorporation of permanent data deletion capabilities. Some victims have reported complete data loss even after ransom payments were made, highlighting the malware’s ruthless efficiency. This feature not only amplifies the pressure on victims to comply with ransom demands but also underscores the importance of robust data backup and recovery strategies.

Attack Methodology

Anubis employs carefully crafted spear-phishing campaigns to deliver malicious payloads through emails that appear to be from trusted sources. On Android devices, Anubis functions primarily as a banking trojan, deploying phishing overlays that mimic legitimate application interfaces to harvest user credentials. The malware simultaneously conducts screen recording and keylogging operations to capture sensitive authentication data, while propagating itself through the victim’s contact list via mass SMS distribution.

Advanced Execution and Persistence Mechanisms

Anubis demonstrates sophisticated technical capabilities in its execution phase, particularly through its use of configurable command-line parameters that enable threat actors to customize attack scenarios. The malware employs specific command parameters including `/KEY=`, `/elevated`, `/PATH=`, `/PFAD=`, and `/WIPEMODE`, allowing operators to control encryption processes, privilege escalation, target directories, and destructive wiping functionality.

On Windows systems, the ransomware implements the Elliptic Curve Integrated Encryption Scheme (ECIES) for file encryption, providing robust cryptographic protection that makes unauthorized decryption extremely difficult. The malware systematically eliminates recovery options by deleting Volume Shadow Copies and terminating critical system services, while simultaneously escalating privileges through access token manipulation techniques. This multi-layered approach ensures maximum impact while preventing victims from utilizing standard recovery mechanisms, forcing organizations into difficult decisions regarding ransom payment versus permanent data loss.

Mitigation Strategies

Given the sophisticated nature of Anubis, organizations and individuals must adopt comprehensive cybersecurity measures to mitigate the risk of infection:

1. Employee Training: Educate staff about the dangers of spear-phishing and the importance of verifying email sources before opening attachments or clicking on links.

2. Regular Backups: Implement regular data backup protocols and ensure backups are stored offline to prevent them from being compromised during an attack.

3. Software Updates: Keep all systems and software up to date with the latest security patches to close vulnerabilities that could be exploited by malware.

4. Endpoint Protection: Deploy robust endpoint protection solutions capable of detecting and responding to ransomware threats in real-time.

5. Access Controls: Enforce strict access controls and the principle of least privilege to limit the potential impact of a compromised account.

6. Incident Response Plan: Develop and regularly update an incident response plan to ensure a swift and coordinated response in the event of an attack.

Conclusion

Anubis ransomware represents a significant evolution in cyber threats, combining the destructive power of ransomware with the stealthy credential-stealing techniques of banking trojans. Its dual-platform approach and sophisticated execution mechanisms make it a formidable adversary. By understanding its methodologies and implementing robust cybersecurity measures, organizations and individuals can better protect themselves against this and similar threats.