New Fully Undetected Anubis Malware Let Hackers Execute Remote Commands
A newly discovered Python-based backdoor called AnubisBackdoor is enabling threat actors to execute remote commands on compromised systems while completely evading detection by most antivirus solutions. Developed by the notorious threat group Savage Ladybug (also known as FIN7), this malware combines simplicity with effectiveness through mild obfuscation techniques, allowing attackers to maintain persistent access to […] The post New Fully Undetected Anubis Malware Let Hackers Execute Remote Commands appeared first on Cyber Security News.

A newly discovered Python-based backdoor called AnubisBackdoor is enabling threat actors to execute remote commands on compromised systems while completely evading detection by most antivirus solutions.
Developed by the notorious threat group Savage Ladybug (also known as FIN7), this malware combines simplicity with effectiveness through mild obfuscation techniques, allowing attackers to maintain persistent access to infected systems without raising security alerts.
The malicious software enables attackers to execute commands remotely, exfiltrate sensitive data, and further compromise systems across an organization’s network infrastructure.
The primary infection vector appears to be malspam campaigns where unsuspecting users receive seemingly legitimate emails containing malicious attachments or links.
When users interact with these malicious elements, the AnubisBackdoor is installed on their systems, establishing persistence mechanisms and communication channels with command and control servers operated by the attackers.
This stealthy approach allows the malware to remain operational for extended periods while victims remain unaware of the compromise.
PRODAFT’s researchers identified that the malware’s effectiveness stems from its carefully designed obfuscation techniques, which have proven remarkably successful at bypassing even sophisticated security solutions.