{"id":112934,"date":"2025-07-15T14:59:36","date_gmt":"2025-07-15T06:59:36","guid":{"rendered":"https:\/\/version-2.com\/?p=112934"},"modified":"2025-07-11T15:01:39","modified_gmt":"2025-07-11T07:01:39","slug":"anubis-new-ransomware-on-the-market","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2025\/07\/anubis-new-ransomware-on-the-market\/","title":{"rendered":"Anubis \u2013 New Ransomware on the Market"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"112934\" class=\"elementor elementor-112934\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-06f0808 post-content elementor-widget elementor-widget-text-editor\" data-id=\"06f0808\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"news__toc\"><p>\u201cSome ransomware wants you to pay. Anubis wants you to suffer.\u201d That\u2019s not a tagline. It\u2019s the growing sentiment among cybersecurity experts who\u2019ve analyzed this latest digital weapon. Anubis doesn\u2019t just encrypt your files and hold them hostage for ransom. It goes one step further: wiping everything clean, even after demanding payment. No recovery. No negotiation. Just devastation.<\/p><\/div><div class=\"news__content mt-5\"><p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-19685 entered loading\" src=\"https:\/\/storware.eu\/wp-content\/uploads\/2025\/07\/07_2025_Anubis_1200x630_1.png\" sizes=\"(max-width: 1200px) 100vw, 1200px\" srcset=\"https:\/\/storware.eu\/wp-content\/uploads\/2025\/07\/07_2025_Anubis_1200x630_1.png 1200w, https:\/\/storware.eu\/wp-content\/uploads\/2025\/07\/07_2025_Anubis_1200x630_1-57x30.png 57w, https:\/\/storware.eu\/wp-content\/uploads\/2025\/07\/07_2025_Anubis_1200x630_1-143x75.png 143w, https:\/\/storware.eu\/wp-content\/uploads\/2025\/07\/07_2025_Anubis_1200x630_1-250x131.png 250w, https:\/\/storware.eu\/wp-content\/uploads\/2025\/07\/07_2025_Anubis_1200x630_1-340x179.png 340w, https:\/\/storware.eu\/wp-content\/uploads\/2025\/07\/07_2025_Anubis_1200x630_1-479x250.png 479w, https:\/\/storware.eu\/wp-content\/uploads\/2025\/07\/07_2025_Anubis_1200x630_1-767x403.png 767w\" alt=\"\" width=\"1200\" height=\"630\" data-ll-status=\"loading\" \/><\/p><p>Unlike traditional ransomware strains, which typically give you a chance to recover your data post-payment, Anubis offers no real path to redemption. Victims are left not only locked out but burned down. This post explains what Anubis ransomware does, how it gets into systems, and why it\u2019s causing serious concern in 2025. You\u2019ll also find practical tips to stay safe and what to do if you\u2019ve already been hit.<\/p><h2 id=\"what-is-anubis-ransomware-and-why-is-it-so-dangerous\">What Is Anubis Ransomware and Why Is It So Dangerous?<b>\u00a0<\/b><\/h2><p>2025 marks the emergence of a new trend in cybercrime: Anubis ransomware. This destructive variant, named after the Egyptian god of death and the afterlife, is living up to its namesake by offering no redemption.<\/p><p>Unlike earlier variants designed primarily for financial extortion, Anubis behaves like a hybrid between ransomware and wiper malware. Its goal is not only to demand payment but to eliminate any hope of recovery, even if the ransom is paid. Victims report total data loss, corrupted boot sectors, and irrecoverable systems. Anubis doesn\u2019t care whether you comply with its demands. Once it strikes, your data is either encrypted, deleted, or both.<\/p><h2 id=\"how-anubis-ransomware-infects-systems\">How Anubis Ransomware Infects Systems<b>\u00a0<\/b><\/h2><p>Anubis doesn\u2019t use novel tricks to gain access. It thrives because it exploits what still works. Several studies have pointed out that its infection methods include:<\/p><ul><li><strong>Phishing Emails\u00a0<\/strong><\/li><\/ul><p>Emails with hazardous links or attachments often appear to be job offers, invoices, or delivery alerts.<\/p><ul><li><strong>Cracked Software and Torrents\u00a0<\/strong><\/li><\/ul><p>Users who install pirated or unverified programs without knowing it make their computers vulnerable to Anubis.<\/p><ul><li><strong>Infected Loaders\u00a0<\/strong><\/li><\/ul><p>Malware loaders like <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-060a\"><span style=\"text-decoration: underline;\">Phobos<\/span><\/a> spread Anubis as a secondary payload, which enables rapid execution.<\/p><ul><li><strong>Exploiting Weaknesses\u00a0<\/strong><\/li><\/ul><p>Old operating systems or third-party apps that haven\u2019t been fixed are the best targets.<\/p><p>Anubis cunningly remains inactive when it infiltrates a system. This allows it to bypass antivirus programs by masquerading as legitimate processes or by checking if it\u2019s running in a virtual environment. After it determines the timing is appropriate, it releases its payload.<\/p><h2 id=\"step-by-step-what-happens-when-youre-infected-with-anubis-ransomware\">Step-by-Step: What Happens When You\u2019re Infected With Anubis Ransomware<b>\u00a0<\/b><\/h2><p>Here\u2019s how a typical Anubis infection unfolds:<\/p><ul><li><strong>Step 1: File Scanning and Targeting\u00a0<\/strong><\/li><\/ul><p>Anubis swiftly searches for important files, including papers, pictures, videos, backups, and more. It also scans for shadow copies and <a href=\"https:\/\/www.ibm.com\/think\/topics\/network-attached-storage\"><span style=\"text-decoration: underline;\">network-attached storage (NAS)<\/span><\/a> to ensure that no recovery point is missed in its detection.<\/p><ul><li><strong>Step 2. Encryption Begins\u00a0<\/strong><\/li><\/ul><p>Using strong AES or <a href=\"https:\/\/www.nist.gov\/image\/headerphoto5png\"><span style=\"text-decoration: underline;\">RSA encryption<\/span><\/a> algorithms, Anubis locks your data and renames files with unique extensions. A ransom note is usually dropped in every affected folder.<\/p><ul><li><strong>Step 3. Data Wiping Initiated\u00a0<\/strong><\/li><\/ul><p>Anubis differs from typical ransomware in that it can remove or modify files even after they have been encrypted. It wipes off boot sectors, stops recovery tools from functioning, and occasionally even wipes drives completely, ensuring your data is permanently deleted.<\/p><ul><li><strong>Step 4. Corruption and System Failure\u00a0<\/strong><\/li><\/ul><p>Some victims report that their machines become unbootable. Others face complete file system collapse. Anubis may overwrite data multiple times to prevent forensic recovery tools from accessing it.<\/p><ul><li><strong>Step 5. Deception and Silence\u00a0<\/strong><\/li><\/ul><p>Even if a victim pays the ransom, they often receive no decryptor\u2014or a fake one. It\u2019s a setup for heartbreak, not hope. Anubis operates with no intention of restoring your files.<\/p><h2 id=\"why-paying-the-ransom-wont-recover-your-files\">Why Paying the Ransom Won\u2019t Recover Your Files<b>\u00a0<\/b><\/h2><p>Many ransomware attacks, while destructive, at least offer a sliver of hope in the form of decryption. Anubis does not.<\/p><ul><li><strong>Wiping Is Part of the Design\u00a0<\/strong><\/li><\/ul><p>The malware is coded to wipe data regardless of whether payment is made. It\u2019s not about extortion\u2014it\u2019s about eliminating recovery.<\/p><ul><li><strong>Fake Ransom Notes\u00a0<\/strong><\/li><\/ul><p>Anubis mimics known ransomware interfaces, but there\u2019s no evidence that the attackers provide functional decryptors. Some keys are corrupted; others never arrive.<\/p><ul><li><strong>Backup Destruction\u00a0<\/strong><\/li><\/ul><p>Anubis actively deletes backups, disables Windows recovery, and wipes external drives\u2014leaving victims completely vulnerable.<\/p><ul><li><strong>Payment Funds Further Attacks\u00a0<\/strong><\/li><\/ul><p>Paying not only fails to solve the problem\u2014it encourages more devastating campaigns. Anubis isn\u2019t just malware; it\u2019s a statement of cybercrime.<\/p><h2 id=\"how-to-protect-your-system-from-anubis-ransomware-attacks\">How to Protect Your System From Anubis Ransomware Attacks<b>\u00a0<\/b><\/h2><p>Protecting yourself from Anubis takes more than just antivirus software. Here\u2019s how to stay ahead:<\/p><ul><li><strong>Harden Your Email Security\u00a0<\/strong><\/li><\/ul><p>Filter out <a href=\"https:\/\/www.fbi.gov\/how-we-can-help-you\/scams-and-safety\/common-frauds-and-scams\/spoofing-and-phishing\"><span style=\"text-decoration: underline;\">phishing emails<\/span><\/a> using AI-powered spam filters and sandbox attachments\u2014train users to recognize and respond to threats.<\/p><ul><li><strong>Patch Regularly\u00a0<\/strong><\/li><\/ul><p>Outdated systems are easy prey. Enable automatic updates across your OS and applications. Monitor for zero-day exploits.<\/p><ul><li><strong>Backup Smarter\u00a0<\/strong><\/li><\/ul><p>Use offline and <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/backup\/backup-azure-immutable-vault-concept\"><span style=\"text-decoration: underline;\">immutable backups<\/span><\/a>. Store copies in multiple geographic locations. Finally, test recovery frequently.<\/p><ul><li><strong>Use Advanced Endpoint Protection\u00a0<\/strong><\/li><\/ul><p>Implement EDR solutions that monitor behavior, detect anomalies, and block encryption in real-time.<\/p><ul><li><strong>Limit Application Access\u00a0<\/strong><\/li><\/ul><p>Restrict what can run by using application whitelisting. Separate networks to prevent infections from spreading laterally.<\/p><ul><li><strong>Stay Informed\u00a0<\/strong><\/li><\/ul><p>To stay up-to-date on emerging strategies, follow cybersecurity alerts, threat information streams, and community sites like MISP.<\/p><h2 id=\"what-to-do-if-anubis-ransomware-hits-you\">What to Do If Anubis Ransomware hits you<b>\u00a0<\/b><\/h2><p>If you suspect that you\u2019ve fallen victim of an Anubis attack, act fast:<\/p><ol><li><strong>1. Disconnect Affected Devices Immediately\u00a0<\/strong><\/li><\/ol><p>Keep infected systems separate from other systems to prevent the spread of infection. Cut off the infected computer from the internet and other networks. Turn off Bluetooth and Wi-Fi. The idea is to isolate Anubis from moving to other systems or getting to cloud backups.<\/p><p><strong><em>\u26d4 Do not reboot the device unless directed to do so by an incident response professional, as it may trigger additional payloads or wiping routines.<\/em><\/strong><\/p><ol><li><strong>2. Notify Your Cybersecurity Team\u00a0<\/strong><\/li><\/ol><p>If you work for a corporation, it\u2019s essential to establish your incident response strategy. Inform your legal and cybersecurity departments. If you\u2019re the lone user, contact specialists or <a href=\"http:\/\/nomoreransom.org\/\"> NoMoreRansom.org<\/a> for ransomware support.<\/p><ol><li><strong>3. Identify the Malware Variant\u00a0<\/strong><\/li><\/ol><p>Use an appropriate program to upload the ransom note or an encrypted file. If you know it\u2019s Anubis, you can determine what recovery solutions are available and which ones are not.<\/p><ol><li><strong>4. Preserve Evidence\u00a0<\/strong><\/li><\/ol><p>Don\u2019t delete encrypted or damaged files yet. Save ransom notes, email headers, system logs, and any suspicious files. These can help investigators trace the source or understand the attack vector.<\/p><ol><li><strong>5. Avoid Paying the Ransom\u00a0<\/strong><\/li><\/ol><p>As covered earlier, paying Anubis is extremely unlikely to result in file recovery. Moreover, it finances further attacks and may even invite future targeting. Focus instead on containment, forensics, and safe restoration<\/p><ol><li><strong>6. Rebuild from Clean Backups\u00a0<\/strong><\/li><\/ol><p>Wipe and reformat the system, then restore from a checked, offline backup. Recovery may be impossible without backups.<\/p><ol><li><strong>7. Report the Incident\u00a0<\/strong><\/li><\/ol><p>If your firm or area has established rules for reporting cybercrime (such as the NCA in the UK, CISA in the US, or CERT in Nigeria), follow them. This helps keep an eye on global trends and informs others.<\/p><h2 id=\"the-future-of-ransomware-why-anubis-is-a-warning-sign\">The Future of Ransomware: Why Anubis Is a Warning Sign<b>\u00a0<\/b><\/h2><p>Anubis is not an isolated case. It\u2019s a sign of where ransomware is headed.<\/p><ul><li><strong>Sabotage Over Profit\u00a0<\/strong><\/li><\/ul><p>We\u2019re seeing a shift toward psychological, destructive attacks that aim to damage reputations, morale, and infrastructure.<\/p><ul><li><strong>Rise of Wiper Hybrids\u00a0<\/strong><\/li><\/ul><p>Like NotPetya before it, Anubis masquerades as ransomware while actually functioning as wiperware. Expect more of these hybrids.<\/p><ul><li><strong>Broader Target Range\u00a0<\/strong><\/li><\/ul><p>While small businesses and individuals are current victims, larger institutions may soon fall prey\u2014especially those lacking resilience.<\/p><ul><li><strong>Security Must Evolve into Resilience\u00a0<\/strong><\/li><\/ul><p>Prevention alone isn\u2019t enough. You need layered defense, tested backups, and response plans. In this age of chaos malware, recovery readiness is everything.<\/p><h2 id=\"how-to-protect-company-from-anubis\">How to Protect Company from Anubis?<\/h2><p>To sum up, Anubis is a particularly nasty strain of ransomware that not only encrypts data but also includes a \u201cwiper\u201d module capable of permanently destroying files, making recovery impossible even if a ransom is paid. It operates as a Ransomware-as-a-Service (RaaS) model, meaning it\u2019s readily available to various cybercriminals, and targets Windows, Linux, NAS, and ESXi environments. However, Storware Backup and Recovery can significantly protect companies against Anubis ransomware by focusing on core principles of robust data protection:<\/p><ul><li><strong>Immutable Backups<\/strong>: Storware supports immutable storage destinations, which means once data is written, it cannot be altered, deleted, or encrypted by ransomware. This is a critical defense against Anubis\u2019s wiper functionality, as even if the active data is destroyed, a clean, unmodifiable copy remains.<\/li><li><strong>Air-Gapped Backups<\/strong>: Storware facilitates air-gapped backup strategies. This involves creating a physical or logical separation between primary data and backup systems. By having backups offline or segmented from the network, they become inaccessible to ransomware, even if the primary network is compromised. This is highly effective against Anubis\u2019s ability to spread across domains and target backup systems.<\/li><li><strong>Multiple Backup Destinations (3-2-1 Rule)<\/strong>: Storware encourages adhering to the 3-2-1 backup rule<\/li><li><strong>Agentless Architecture (for certain workloads)<\/strong>: For some environments like virtual machines, Storware offers an agentless approach, reducing the attack surface. This means fewer agents on individual machines that could potentially be exploited by ransomware.<\/li><li><strong>Granular Recovery<\/strong>: Storware enables granular recovery, allowing companies to restore specific files, folders, or even entire virtual machines from a clean backup point. This minimizes downtime and data loss in the event of an Anubis attack.<\/li><li><strong>Snapshot Management<\/strong>: Storware provides stable, agentless snapshot management for virtual machines and other environments. Snapshots can be taken frequently, offering granular recovery points and allowing organizations to revert to a state before an infection occurred.<\/li><li><strong>Support for Diverse Environments<\/strong>: Anubis targets various environments (Windows, Linux, NAS, ESXi). Storware\u2019s broad support for virtual machines, containers, cloud instances, applications, and endpoints ensures that a wide range of company data can be protected.<\/li><\/ul><p>In essence, Storware Backup and Recovery empowers companies to protect against Anubis ransomware by providing a reliable and resilient backup infrastructure that emphasizes immutability, isolation, and multiple recovery points. This significantly reduces the impact of an attack and enables a swift recovery, even in the face of Anubis\u2019s destructive wiper capabilities.<\/p><h2 id=\"final-thoughts\">Final Thoughts<b>\u00a0<\/b><\/h2><p>In 2025, ransomware attacks underwent significant changes. It is no longer just a financial burden; it is now a weapon. Anubis indicates that future cyberattacks will combine stealth, accuracy, and damage, targeting not only your data but also your confidence in recovery.<\/p><p>For individuals and organizations, the message is clear: don\u2019t wait for the encryption screen to act. Start treating ransomware defense like disaster planning, because with threats like Anubis on the loose, that\u2019s precisely what it is.<\/p><p>\u00a0<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 post-content elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"83046\" class=\"elementor elementor-83046\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1f508312 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1f508312\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5d0a9f4a\" data-id=\"5d0a9f4a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1aff8842 elementor-widget elementor-widget-text-editor\" data-id=\"1aff8842\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Storware<br \/><\/strong>Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u201cSome ransomware wants you to pay. Anubis wants you to  [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1291,1305,61],"tags":[1292,1077],"class_list":["post-112934","post","type-post","status-publish","format-standard","hentry","category-storware","category-1305","category-press-release","tag-storware","tag-1077"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Anubis \u2013 New Ransomware on the Market - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/storware.eu\/blog\/anubis-new-ransomware-on-the-market\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anubis \u2013 New Ransomware on the Market - Version 2\" \/>\n<meta property=\"og:description\" content=\"\u201cSome ransomware wants you to pay. Anubis wants you to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/storware.eu\/blog\/anubis-new-ransomware-on-the-market\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-15T06:59:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/storware.eu\/wp-content\/uploads\/2025\/07\/07_2025_Anubis_1200x630_1.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/anubis-new-ransomware-on-the-market\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/07\\\/anubis-new-ransomware-on-the-market\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Anubis \u2013 New Ransomware on the Market\",\"datePublished\":\"2025-07-15T06:59:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/07\\\/anubis-new-ransomware-on-the-market\\\/\"},\"wordCount\":1772,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/anubis-new-ransomware-on-the-market\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/storware.eu\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/07_2025_Anubis_1200x630_1.png\",\"keywords\":[\"Storware\",\"2025\"],\"articleSection\":[\"Storware\",\"2025\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/storware.eu\\\/blog\\\/anubis-new-ransomware-on-the-market\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/07\\\/anubis-new-ransomware-on-the-market\\\/\",\"url\":\"https:\\\/\\\/storware.eu\\\/blog\\\/anubis-new-ransomware-on-the-market\\\/\",\"name\":\"Anubis \u2013 New Ransomware on the Market - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/anubis-new-ransomware-on-the-market\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/anubis-new-ransomware-on-the-market\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/storware.eu\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/07_2025_Anubis_1200x630_1.png\",\"datePublished\":\"2025-07-15T06:59:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/anubis-new-ransomware-on-the-market\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/storware.eu\\\/blog\\\/anubis-new-ransomware-on-the-market\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/anubis-new-ransomware-on-the-market\\\/#primaryimage\",\"url\":\"https:\\\/\\\/storware.eu\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/07_2025_Anubis_1200x630_1.png\",\"contentUrl\":\"https:\\\/\\\/storware.eu\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/07_2025_Anubis_1200x630_1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/anubis-new-ransomware-on-the-market\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Anubis \u2013 New Ransomware on the Market\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Anubis \u2013 New Ransomware on the Market - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/storware.eu\/blog\/anubis-new-ransomware-on-the-market\/","og_locale":"zh_HK","og_type":"article","og_title":"Anubis \u2013 New Ransomware on the Market - Version 2","og_description":"\u201cSome ransomware wants you to pay. Anubis wants you to [&hellip;]","og_url":"https:\/\/storware.eu\/blog\/anubis-new-ransomware-on-the-market\/","og_site_name":"Version 2","article_published_time":"2025-07-15T06:59:36+00:00","og_image":[{"url":"https:\/\/storware.eu\/wp-content\/uploads\/2025\/07\/07_2025_Anubis_1200x630_1.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"6 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/storware.eu\/blog\/anubis-new-ransomware-on-the-market\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/07\/anubis-new-ransomware-on-the-market\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Anubis \u2013 New Ransomware on the Market","datePublished":"2025-07-15T06:59:36+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/07\/anubis-new-ransomware-on-the-market\/"},"wordCount":1772,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/storware.eu\/blog\/anubis-new-ransomware-on-the-market\/#primaryimage"},"thumbnailUrl":"https:\/\/storware.eu\/wp-content\/uploads\/2025\/07\/07_2025_Anubis_1200x630_1.png","keywords":["Storware","2025"],"articleSection":["Storware","2025","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/storware.eu\/blog\/anubis-new-ransomware-on-the-market\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/07\/anubis-new-ransomware-on-the-market\/","url":"https:\/\/storware.eu\/blog\/anubis-new-ransomware-on-the-market\/","name":"Anubis \u2013 New Ransomware on the Market - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/storware.eu\/blog\/anubis-new-ransomware-on-the-market\/#primaryimage"},"image":{"@id":"https:\/\/storware.eu\/blog\/anubis-new-ransomware-on-the-market\/#primaryimage"},"thumbnailUrl":"https:\/\/storware.eu\/wp-content\/uploads\/2025\/07\/07_2025_Anubis_1200x630_1.png","datePublished":"2025-07-15T06:59:36+00:00","breadcrumb":{"@id":"https:\/\/storware.eu\/blog\/anubis-new-ransomware-on-the-market\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/storware.eu\/blog\/anubis-new-ransomware-on-the-market\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/storware.eu\/blog\/anubis-new-ransomware-on-the-market\/#primaryimage","url":"https:\/\/storware.eu\/wp-content\/uploads\/2025\/07\/07_2025_Anubis_1200x630_1.png","contentUrl":"https:\/\/storware.eu\/wp-content\/uploads\/2025\/07\/07_2025_Anubis_1200x630_1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/storware.eu\/blog\/anubis-new-ransomware-on-the-market\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Anubis \u2013 New Ransomware on the Market"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-tnw","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/112934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=112934"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/112934\/revisions"}],"predecessor-version":[{"id":112938,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/112934\/revisions\/112938"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=112934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=112934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=112934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}