Microsoft Warns Of Another ‘Anubis’ Malware Targeting Windows

Microsoft recently warned of a new malware targeting Windows systems. Also dubbed Anubis, this Windows malware is not related to the Android banking trojan discovered earlier.

Microsoft Warns Of Anubis Windows Malware

Reportedly, Microsoft Security Intelligence (MSI) has caught a new malware in the wild targeting Windows. Identified as Anubis, this malware is basically an infostealer aiming at sensitive data of the users.

Analyzing the malware reveals that this Trojan leverages the code of Loki malware for stealing data. Lokibot surfaced online a few years ago, and it wreaked havoc when it transformed into ransomware.

Microsoft has shared some glimpses in the following tweet.

For now, the malware has a very narrow and specific range of targets and does not maintain an overwhelming presence. As MSI stated,

Anubis is deployed in what appears to be limited, initial campaigns that have so far only used a handful of known download URLs and C2 servers.

Also, it is specifically targeting Windows systems only. Though, Microsoft Defender detects this malware as PWS:MSIL/Anubis.G!MTB. Hence, users running Microsoft Defender on their systems are seemingly safe as the anti-malware will block Anubis whenever detected.

Microsoft has also shared the indicators of compromise (IoC) for this threat.

Malware Active In The Wild

As revealed, the team first caught the malware in June. They now find it under active distribution in the wild.

Though the malware bears the name Anubis, MSI has cleared that it is not linked to the Android trojan with the same name.

While the Android malware was basically a banking trojan, this Windows malware is an infostealer that not only steals financial data but also aims at other information such as users’ login credentials, system information, as well as cryptocurrency wallets.

For now, it is unclear how the attackers are deploying this malware on target systems.

Thus, all Windows users must remain very careful while downloading third-party software, interacting with emails, and visiting websites. Also, make sure to have a robust anti-malware running on the devices to block any malware right away.

Related posts

Hard-Coded Credentials Vulnerability Found In Kubernetes Image Builder

Critical Vulnerability Patched In Jetpack WordPress Plugin

Astaroth Banking Malware Runs Actively Targets Users In Brazil