Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

SAP-related npm packages compromised in supply chain attack that steals credentials

Uber is now entering the hotel business thanks to AI

New wave of North Korean attacks using AI-embedded npm malware, fake companies, and RATs

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » FIN7 deploys Anubis Backdoor to hijack Windows systems through compromised SharePoint sites
Identity

FIN7 deploys Anubis Backdoor to hijack Windows systems through compromised SharePoint sites

By April 2, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 2, 2025Ravi LakshmananRansomware/Email Security

Hijack your Windows system

A financially motivated threat actor known as FIN7 is linked to a Python-based backdoor called Anubis (not to be confused with Android Banking Trojan of the same name) that allows remote access to compromised Windows systems.

“The malware allows an attacker to perform remote shell commands and other system operations to give him complete control over the infected machine,” Swiss Cybersecurity Company Prodaft said in a technical report for the malware.

Cybersecurity

FIN7 is also known as Carbon Spider, Elbras, Gold Niagara, Sangria Tempest, and Savage Ten Bug, a Russian cybercrime group known for its evolving and expanding set of malware families to obtain early access and data exfoliation. In recent years, it is said that threat actors have moved to ransomware affiliate marketing.

In July 2024, the group was observed to promote a tool called Aukill (aka Avneutralizer), which can use a variety of online aliases to terminate security tools in attempts that could diversify their monetization strategies.

Anubis is usually thought to be propagated through the Malspam campaign, which entices victims to run payloads hosted on the compromised SharePoint site.

The entry point for infections delivered in the form of zip archives is a Python script designed to directly decrypt and execute the major obfuscated payloads in memory. Upon booting, the backdoor establishes communication with the remote server via a TCP socket in Base64 encoded format.

Also, responses from the base 64 encoded server collect the host’s IP address, upload/download the file, change the current working directory, change the grab environment variables, change the Windows registry, load the DLL file into memory using PythonMemoryModule and exit.

Cybersecurity

In an independent analysis of Anubis, German security company GDATA said that the backdoor also supports the ability to perform responses provided by operators as shell commands for the victim system.

“This allows attackers to take actions such as keylogging, taking screenshots, and stealing passwords without storing these features directly on the infected system,” Prodaft said. “By keeping the backdoor as light as possible, we reduce the risk of detection while still maintaining the flexibility to carry out even malicious activities.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleStephen Curry’s 52 points: Warriors win against the Grizzlies | Basketball News
Next Article The EU proposes flexibility in vehicle CO2 emission targets

Related Posts

SAP-related npm packages compromised in supply chain attack that steals credentials

April 29, 2026

New wave of North Korean attacks using AI-embedded npm malware, fake companies, and RATs

April 29, 2026

How to automate exposure verification at the speed of AI attacks

April 29, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

SAP-related npm packages compromised in supply chain attack that steals credentials

Uber is now entering the hotel business thanks to AI

New wave of North Korean attacks using AI-embedded npm malware, fake companies, and RATs

Meet Shapes, an app that brings humans and AI into the same group chat

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.