🎉 #Gate xStocks Trading Share# Posting Event Is Ongoing!
📝 Share your trading experience on Gate Square to unlock $1,000 rewards!
🎁 5 top Square creators * $100 Futures Voucher
🎉 Share your post on X – Top 10 posts by views * extra $50
How to Participate:
1️⃣ Follow Gate_Square
2️⃣ Make an original post (at least 20 words) with #Gate xStocks Trading Share#
3️⃣ If you share on Twitter, submit post link here: https://www.gate.com/questionnaire/6854
Note: You may submit the form multiple times. More posts, higher chances to win!
📅 End at: July 9, 16:00 UTC
Show off your trading on Gate Squ
Anubis Ransomware Emerges With Rare Dual File Wipe And Encrypt Mode
HomeNews* An emerging Ransomware named Anubis has a destructive feature that can both encrypt and permanently erase victims’ files.
Anubis operates as a ransomware-as-a-service (RaaS). It runs an affiliate program with negotiable revenue splits, allowing affiliates to take as much as 80% of the ransom paid by victims. Alternative schemes for data extortion and access sales offer 60-40 and 50-50 splits, respectively. The researchers explain that Anubis affiliates use phishing emails to gain initial access, escalate user privileges, delete backup copies (called volume shadow copies), and then encrypt or wipe files. When in "wipe mode," file contents are destroyed, reducing their size to zero while leaving file names and extensions intact.
“The ransomware includes a wiper feature using /WIPEMODE parameter, which can permanently delete the contents of a file, preventing any recovery attempt,” Trend Micro noted. This dual-threat capability is considered rare and increases the likelihood of victims paying.
It is important to note that this Anubis ransomware has no connection to an Android banking trojan or to the FIN7 hacking group, which uses the same name for other malware.
In related developments, threat intelligence firm Recorded Future reported new infrastructure associated with FIN7, some of which pretends to be legitimate software products to spread the NetSupport RAT remote access tool. Distribution methods have included fake browser update pages and bogus download sites for software like 7-Zip.
Currently, only fake 7-Zip pages were found to be active as of April 2025, according to Recorded Future’s Insikt Group.