Connect with us

Hi, what are you looking for?



Microsoft Warns of New ‘Anubis’ Info-Stealer Distributed in the Wild

Microsoft warned on Thursday that a recently uncovered piece of malware designed to help cybercriminals steal information from infected systems is now actively distributed in the wild.

Microsoft warned on Thursday that a recently uncovered piece of malware designed to help cybercriminals steal information from infected systems is now actively distributed in the wild.

The malware has been named Anubis, but the tech giant has pointed out that it’s not related to the Android malware that has the same name.

The new threat targets Windows systems and it’s detected by Microsoft security solutions as PWS:MSIL/Anubis.G!MTB. The company says Anubis uses code forked from the information-stealing trojan called Loki, and it’s capable of harvesting system information, payment card details, credentials, and cryptocurrency wallets.

Microsoft says Anubis was first spotted being sold on cybercrime forums in June, but it’s now actively being distributed in the wild.

“Anubis is deployed in what appears to be limited, initial campaigns that have so far only used a handful of known download URLs and C2 servers,” the company explained.

Microsoft says it will continue to monitor the info-stealer, but in the meantime it has shared some indicators of compromise (IoC), which can be used to detect the malware or to further analyze it.

Anubis IOC

Related: Enterprises in Americas, Europe Targeted With Valak Information Stealer

Related: Oski Stealer Targets Browser Data, Crypto Wallets in U.S.

Advertisement. Scroll to continue reading.

Related: Baldr Malware: A Short-Lived Star or Info Stealer That Will Return?

Related: Emotet Resumes Activity After Five Months of Silence

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.


SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.


People on the Move

Digital executive protection services provider BlackCloak has appointed Ryan Black as CISO.

Joe Levy has been appointed Sophos' permanent CEO, and Jim Dildine has been named the company's CFO.

CISA executive assistant director for cybersecurity Eric Goldstein is leaving the agency after more than three years.

More People On The Move

Expert Insights

Related Content


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.