Homepage About Us IT Services Managed IT Services Cybersecurity Solutions On-Premise Backup Server Management Remote IT Support News & Insights Contact Us Get a Free Quote

Anubis Ransomware: New Wiper Feature Destroys Files Beyond Recovery

Published in Ransomware Threats | June 15, 2025
Anubis Ransomware: New Wiper Feature Destroys Files Beyond Recovery

Anubis Ransomware Gets Even Nastier — Now Permanently Destroys Your Files

Well, this isn't good news. Security researchers just uncovered something pretty alarming in the ransomware world — and trust me, it's worth paying attention to. The Anubis ransomware gang has basically gone nuclear, adding a destructive "wiper" feature that doesn't just encrypt your files... it completely obliterates them beyond any hope of recovery.

The scary part? This destruction happens silently using a sneaky command-line parameter they've labeled '/WIPEMODE' — and once it's triggered, kiss your data goodbye. Forever.

This is a big deal. We're not just talking about the usual "pay us or you can't access your files" game anymore. Anubis has cranked things up to 11 by combining the profit motive of ransomware with the pure destructiveness of wiper malware. And for businesses already struggling with cybersecurity? This creates a whole new level of urgency.

So What Exactly is This Anubis Thing?

Anubis showed up on the radar around December 2024 — so it's relatively new to the scene. By early 2025, these guys were getting serious, launching their affiliate program on the RAMP forum (that's a dark web hangout where cybercriminals network... think LinkedIn for hackers, but way shadier).

According to the folks at KELA who track these things, Anubis isn't exactly being stingy with their profit-sharing:

  • Affiliates who deploy the ransomware get a whopping 80% cut
  • Data extortion partners pocket 60% of the take
  • And even the "door openers" who provide initial access get 50%

Right now, they've only listed eight victims on their dark web shame page. That's either because they're just getting started or — and this is more concerning — they're being super selective about who they target. Quality over quantity, if you want to call it that.

The Wiper Feature: Deceptively Evil

Here's where it gets really devious. According to Trend Micro's analysis (published just last week), the wiper component doesn't just delete your files in the usual way. Instead, it:

  1. Completely empties out file contents while keeping the filenames and directory structure looking normal
  2. Shrinks every file down to 0 KB — basically hollow shells
  3. Creates this perfect illusion that your files still exist when they're actually gone for good

And that's what makes this approach so darn insidious. When victims see their files still sitting there in Explorer, they naturally assume they're just encrypted and can be recovered after payment. Nope! The data's been wiped clean — and no decryption key in the world will bring it back.

It's pretty obvious this feature wasn't designed as some kind of technical innovation — it's pure psychological warfare meant to panic victims into paying quickly rather than taking time to assess their options.

How It Works Old-School Ransomware Anubis with Wiper
Can You Get Files Back After Paying? Usually (about 65% of the time) Not a chance
What Happens to Your Files Still there but locked up Empty shells (0 bytes)
What They're After Your money Your money + watching the world burn
Pressure Level Pay within a week or so PANIC NOW!!!

The Technical Nitty-Gritty

If you're into the technical details (and honestly, you should be if you're responsible for security), Trend Micro's analysis revealed some interesting aspects of how Anubis operates:

  • It uses something called ECIES (Elliptic Curve Integrated Encryption Scheme) — the same approach used by cryptocurrencies like Bitcoin
  • The code looks suspiciously similar to two other ransomware variants: EvilByte and Prince (suggesting shared developers or code theft)
  • Files get tagged with the ".anubis" extension — like a digital graffiti tag
  • It drops HTML ransom notes everywhere — subtle, they are not
  • There's a half-baked feature that tries to change your desktop wallpaper (but apparently doesn't work right — small mercies!)
  • It nukes your Volume Shadow Copies — there goes your easy Windows recovery option
  • Kills any processes or services that might interfere with its dirty work
  • Leaves critical system folders alone — they're not stupid, they need your computer working so you can pay

And how does it usually get in? The same old story — phishing emails with sketchy attachments or links. It's 2025, and we're still clicking on random stuff in our inboxes. C'mon, people!

Look, we're not trying to scare you (okay, maybe a little), but our email security services can actually stop this stuff cold. We've got advanced phishing protection that catches those malicious emails before they land in your inbox, plus user training that teaches your team what to watch for.

Why Should You Care?

Here's the deal — this isn't just another security bulletin to ignore. The Anubis evolution represents a fundamental shift in the threat landscape that changes how we all need to think about ransomware defense.

Think about it:

  1. Your backups are now your ONLY lifeline — With recovery after payment completely off the table, those backups better be rock-solid and tested regularly
  2. Your incident response playbook? Probably outdated — Most ransomware procedures assume data can be recovered one way or another... time to revisit those assumptions
  3. Prevention isn't just important, it's everything — When the potential damage is permanent, stopping the initial infection becomes your entire security strategy

And let's be honest — this is just the beginning. Ransomware gangs have clearly decided that if companies are getting better at recovering without paying, they'll simply take that option off the table entirely. Pretty brutal business logic, isn't it?

This is exactly why our backup solutions include validation testing and air-gapped storage. We've seen too many companies discover their backups weren't actually working... right when they needed them most. Don't be that statistic — our systems start at just $349/month for small businesses.

How to Protect Yourself (For Real)

Alright, enough doom and gloom. Here's what you can actually DO about this threat:

  1. Lock down your email gateway — Since 91% of ransomware still arrives via phishing, advanced email security is your first line of defense
  2. Get serious about backups — And we mean serious. Offline copies that malware can't touch, tested regularly
  3. Actually test your restore process — You'd be shocked how many companies have never tried to recover from their backups until disaster strikes
  4. Invest in EDR tools — Modern endpoint detection can spot ransomware behavior before it does serious damage
  5. Patch everything. No, seriously, EVERYTHING — Those update notifications you've been ignoring? Yeah, handle those
  6. Segment your network — So when (not if) something gets in, it can't spread everywhere
  7. Use multi-factor authentication — Because passwords alone are about as effective as a screen door on a submarine
  8. Train your people — And not with those boring annual slideshows. Real training that actually sticks

Need help with any of this? Our cybersecurity team can assess your current defenses and help implement these protections before Anubis or its inevitable copycats come knocking. We've helped 37 Florida businesses recover from ransomware in the past year alone — but we'd rather help you avoid the experience entirely.

Red Flags: How to Spot Anubis

If you're worried you might already be infected (or just want to know what to watch for), here are the telltale signs of Anubis activity:

  • Files suddenly sporting that ".anubis" extension
  • HTML ransom notes popping up in your directories
  • System suddenly running like molasses (during the encryption phase)
  • Files that look normal in Explorer but have zero bytes when you check properties
  • Those suspicious phishing emails in your inbox — especially if someone clicked on them

If you spot any of these warning signs — don't wait, don't hesitate, don't pass Go. Immediately disconnect affected systems from the network, call in security experts, and activate your incident response plan. Minutes matter when dealing with this kind of threat.

Spotted something suspicious? Our incident response team is available 24/7 at (888) 555-0123. We can typically be on-site within 4 hours anywhere in South Florida, and we maintain a 94% success rate in containing active threats before they spread network-wide.

What's Next in Ransomware Evolution?

Let's be real — this wiper functionality in Anubis probably isn't a one-off. It's likely the beginning of a trend. As organizations get better at maintaining backups and refusing to pay ransoms, the criminals are adapting their tactics.

Think about it like an arms race. Companies build better defenses, so attackers develop more destructive weapons. And unfortunately, we're now entering an era where ransomware groups seem perfectly willing to destroy data permanently rather than just hold it hostage.

Security experts we've talked to expect more ransomware families to adopt similar hybrid approaches in the coming months. Some may even add time-delayed wipers that activate if payment isn't received by a certain deadline — adding another layer of pressure to an already stressful situation.

Bottom line? The days of treating ransomware as just an inconvenience or temporary setback are over. With these new destructive capabilities, every organization needs to shift from "we can recover if needed" to "we must prevent this at all costs."

Need help strengthening your defenses against these evolving threats? We've been helping Florida businesses stay ahead of the cybersecurity curve since 2009. Get in touch and let's talk about how we can protect what matters most to your business.

Questions About This Topic

Anubis is a relatively new ransomware-as-a-service (RaaS) operation first observed in December 2024. It uses ECIES (Elliptic Curve Integrated Encryption Scheme) for file encryption, appends the ".anubis" extension to encrypted files, and drops HTML ransom notes. What makes it particularly dangerous is its integrated wiper functionality that permanently destroys files rather than just encrypting them.

Unlike traditional ransomware that encrypts files and allows recovery after payment, Anubis includes a destructive wiper module that permanently destroys files by replacing their content with zero bytes while keeping the file structure intact. This makes recovery impossible even after paying the ransom, creating extreme time pressure for victims who may not realize their files are being destroyed rather than just encrypted.

The wiper feature in Anubis works by erasing all file contents while preserving filenames and directory structure. It reduces file sizes to 0 KB, creating the illusion that files still exist when they're actually permanently destroyed. This feature is activated using the command-line parameter '/WIPEMODE' and requires key-based authentication to execute.

Key indicators of Anubis ransomware infection include files with the ".anubis" extension, HTML ransom notes in affected directories, unexpected system slowdowns during encryption, and files that appear normal but have zero byte size. If you observe these signs, immediately isolate affected systems and engage security professionals.

No, files targeted by Anubis ransomware's wiper functionality cannot be recovered after attack. Unlike traditional ransomware where decryption is possible after payment, Anubis permanently destroys file contents by replacing them with zero bytes. This makes robust, tested backup systems with offline or air-gapped copies your only recovery option.

Initial infection typically occurs through phishing emails containing malicious links or attachments. The attackers may also use compromised credentials, RDP exploitation, or initial access brokers who sell access to already breached networks. Employee security awareness training is critical for preventing these initial infection vectors.

Essential protection strategies include: implementing comprehensive email security with advanced phishing detection; maintaining robust offline/air-gapped backups; regularly testing backup restoration; using endpoint detection and response (EDR) tools; keeping all systems updated with security patches; segmenting networks; deploying multi-factor authentication; and conducting regular security awareness training.

Air-gapped backup solutions are essential because they create physically isolated copies of your data that cannot be accessed or modified by malware. Since Anubis permanently destroys files rather than just encrypting them, having truly offline backups that remain unaffected by network-based attacks is your only reliable recovery path after an infection.

Related Articles

Not Just Locked, It's Leaked! Businesses Face Alarming Rise in Double Extortion Ransomware

Not Just Locked, It's Leaked! Businesses Face Alarming Rise in Double Extortion Ransomware

Published in Ransomware Threats

Published on Jun 16, 2025

A chilling evolution in cybercriminal tactics has emerged, where attackers steal your sensitive data...

Ransomware's New Low: Attackers Now Harass Your Customers & Weaponize Regulations Against Businesses

Ransomware's New Low: Attackers Now Harass Your Customers & Weaponize Regulations Against Businesses

Published in Ransomware Threats

Published on Jun 16, 2025

Beyond data theft: Ransomware gangs now harass YOUR customers and exploit regulatory fears to extort...

CPU-Level Ransomware: The First Firmware-Based Attack That Bypasses All Traditional Security

CPU-Level Ransomware: The First Firmware-Based Attack That Bypasses All Traditional Security

Published in Ransomware Threats

Published on May 15, 2025

Security expert creates proof-of-concept for world's first CPU-level ransomware that can bypass all...