Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

New Threats Emerge: FIN7's Anubis Backdoor Puts Enterprise Environments at Risk



FIN7's Anubis backdoor poses a significant threat to enterprise environments due to its stealthy nature and ability to evade detection. The backdoor provides remote access to compromised Windows systems and supports multiple commands, making it a formidable opponent for security professionals. To mitigate this risk, organizations must take proactive measures to update software, employ robust antivirus solutions, and conduct regular vulnerability assessments.

  • FIN7 has developed a new Python-based backdoor called Anubis that allows remote access to infected Windows systems.
  • Anubis executes shell commands and system operations while using obfuscation to evade detection.
  • The malware is distributed via phishing and hosted on compromised SharePoint sites, posing a significant threat to enterprise environments.
  • FIN7's Anubis backdoor demonstrates the group's adaptability and efforts to diversify their delivery mechanisms for different operational scenarios.
  • The backdoor supports multiple commands, including retrieving IP, modifying the registry, executing Python code, and loading DLLs into memory.
  • Ongoing refinement by attackers results in variants of the backdoor executing the payload differently.



  • FIN7, a notorious Russian cybercrime group also known as Carbanak, has been linked to a new Python-based backdoor called Anubis. This malware, which provides remote access to compromised Windows systems, has been used by FIN7 to gain full control over infected systems.

    The threat actor FIN7 has developed a new Python-based malware, named Anubis Backdoor, which allows attackers to gain full remote control over infected Windows systems. It executes shell commands and system operations while using obfuscation to evade detection. Delivered via phishing and hosted on compromised SharePoint sites, it remains undetected by most antivirus solutions, posing a serious security risk.

    "The malware is distributed as a ZIP package, which includes a single Python script alongside multiple Python executables," reads the report published by cybersecurity firm PRODAFT. "Some variants execute the obfuscated payload immediately after writing it to disk, while others load the payload and call a specific function from it." This variability in execution methods demonstrates the malware's adaptability and the threat actor's efforts to diversify their delivery mechanisms for different operational scenarios.

    FIN7 is a Russian criminal group that has been active since mid-2015. It focuses on restaurants, gambling, and hospitality industries in the US to harvest financial information that was used in attacks or sold in cybercrime marketplaces.

    The researchers noted that a Python script with ~30 lines serves as the main entry point, decrypting and executing the real payload. The backdoor, targeting Windows, uses AES-CBC encryption with base64 encoding and loads the payload via the exec function. Its obfuscation method, replacing variable names with similar characters, resembles tools like PyObfuscate or Anubis Obfuscator, making analysis harder but not highly complex.

    The backdoor communicates via a single TCP socket, switching servers if one fails. Messages, including the groupname, are base64-encoded. Upon execution, it sends the process ID and local IP to the C2 server. To determine the local IP, it creates a UDP socket to 8.8.8.8 on port 80, letting the OS resolve the appropriate address without actual traffic. Each payload contains a groupname and two IPs for communication.

    The backdoor supports multiple commands, including retrieving IP, modifying the registry, executing Python code, and loading DLLs into memory. Remote code execution allows the malware to load malicious functionalities dynamically. The malware supports functionalities like keylogging, file transfers, and registry modifications. It continuously processes commands until termination, using subprocess.Popen for shell execution.

    "The AnubisBackdoor is a stealthy Python-based tool used by Savage Ladybug (FIN7) to maintain access to compromised systems," concludes the report. "Despite its mild obfuscation, it remains fully undetected (FUD) by most antivirus solutions. Delivered via malspam campaigns, with compromised SharePoint instances serving the payload, it poses a significant threat to enterprise environments." Variants of the backdoor execute the payload differently, suggesting ongoing refinement by attackers.

    In recent times, there has been an increase in new threats emerging across various sectors and domains, including cybersecurity. It is imperative for organizations to stay vigilant and implement robust security measures to mitigate the risks posed by such threats. The emergence of FIN7's Anubis backdoor highlights the importance of keeping software up-to-date, employing robust antivirus solutions, and conducting regular vulnerability assessments.

    The increasing sophistication and adaptability of cyber threats necessitate a multi-faceted approach towards cybersecurity. This includes staying informed about emerging threats, implementing robust security protocols, and fostering a culture of cybersecurity awareness among employees. By doing so, organizations can minimize the risks posed by threats like FIN7's Anubis backdoor.

    In conclusion, FIN7's Anubis backdoor represents a significant threat to enterprise environments worldwide. Its ability to evade detection and adapt to different operational scenarios makes it a formidable opponent for security professionals. It is crucial for organizations to take proactive measures to mitigate this risk, including updating software, employing robust antivirus solutions, and conducting regular vulnerability assessments.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/New-Threats-Emerge-FIN7s-Anubis-Backdoor-Puts-Enterprise-Environments-at-Risk-ehn.shtml

  • https://securityaffairs.com/176134/malware/new-advanced-fin7s-anubis-backdoor-allows-to-gain-full-system-control-on-windows.html


  • Published: Wed Apr 2 18:37:04 2025 by llama3.2 3B Q4_K_M













     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us