A new Ransomware-as-a-Service (RaaS) operation named Anubis is introducing a disturbing feature that escalates extortion tactics: a built-in data wiper. First seen in late 2024 as a prototype called "Sphinx," the Anubis group now advertises on Russian-language forums, offering a flexible attack model. Affiliates can choose between standard file encryption or executing the malware with a /WIPEMODE parameter. This mode does not encrypt files but instead permanently overwrites them with null bytes, making data recovery impossible. This changes the negotiation dynamic, as the promise of a decryption key becomes irrelevant. Instead, the attackers rely on the threat of leaking previously exfiltrated data, using the irreversible destruction as a powerful coercive tool. This hybrid encrypt/wipe/leak model provides attackers with multiple monetization paths and significantly increases pressure on victims.
Anubis operates as a RaaS platform, providing malware and infrastructure to affiliates who carry out attacks. Its key differentiator is the flexibility of its impact phase.
/WIPEMODE command-line argument, the malware switches to a destructive function. It traverses the file system and overwrites the content of targeted files, reducing them to zero-byte files but leaving the original filenames intact. This is a purely destructive act.This dual-mode capability suggests a strategic shift in extortion. Anubis operators can use the wipe mode in several scenarios:
The group advertises its services on forums like RAMP and XSS, using aliases such as "superSonic," and targets a wide range of industries opportunistically, including healthcare, construction, and engineering in countries like the U.S., Canada, Australia, and Peru.
It is important to note this Anubis ransomware is unrelated to the older Anubis Android banking trojan or the Anubis backdoor linked to the FIN7 group.
/WIPEMODE parameter. This makes it easy for even less sophisticated affiliates to deploy the destructive payload.T1485 - Data Destruction.T1486 - Data Encrypted for Impact), data theft, and data destruction as interchangeable tools to be deployed based on the situation, maximizing psychological pressure and potential payout.The inclusion of a wiper function dramatically increases the potential impact of an Anubis attack.
/WIPEMODE.Given the destructive nature of Anubis, preventative and recovery-focused mitigations are paramount.
M1053 - Data Backup): This is the most critical defense against wipers. Maintain multiple, tested backups, with at least one copy being offline (air-gapped) or immutable (unable to be altered or deleted). Regularly test the restoration process.M1030 - Network Segmentation): Segment the network to contain the spread of a ransomware/wiper infection. Prevent lateral movement from workstations to critical servers.M1038 - Execution Prevention): Use application allow-listing to prevent unauthorized executables from running on endpoints and servers.M1026 - Privileged Account Management): Strictly control and monitor the use of privileged accounts, as these are required to deploy ransomware across a network.The single most critical mitigation against destructive wipers. Maintain offline, air-gapped, or immutable backups and test restoration procedures regularly.
Use EDR solutions that can detect and block mass file modification/deletion behaviors characteristic of ransomware and wipers.
Contain the blast radius of an attack by segmenting networks to prevent rapid lateral movement.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats