Malware, Encryption, Threat Intelligence

FIN7 Uses Python-Based Anubis Backdoor in Windows Attacks

A digital warning sign with "SYSTEM HACKED" in bright red, overlaying a complex background of computer code and digital interfaces, with a deep blue and black color scheme, creating a sense of urgency and alarm.

Russian APT group FIN7—also known as Carbanak and Savage Ladybug—is using a new Python-based Anubis backdoor to gain full remote control of Windows systems, according to Security Affairs.

FIN7 sends malspam (malware spam) to trick users into downloading malicious ZIP files from compromised SharePoint sites. These files contain Python scripts that decrypt and run the Anubis backdoor, which supports keylogging, file transfers, in-memory DLL loading, and continuous command execution.

Despite only mild obfuscation, the malware remains undetected by most antivirus tools, says PRODAFT, who also notes ongoing refinements in how variants execute the payload. The malware’s core—a 30-line Python script—decrypts and executes an AES-CBC encrypted payload using base64 encoding and the exec function. It communicates with command-and-control servers over a single TCP socket and switches to backup servers if needed. Upon launch, it shares the infected system’s process ID and local IP with the attackers.

The malware is also capable of executing shell commands, modifying the registry, and dynamically loading malicious functionalities, making it highly adaptable and dangerous. FIN7 has been active since 2015, primarily targeting U.S.-based restaurants, gambling, and hospitality sectors to steal financial data for use in attacks or sale on cybercrime markets.

You can skip this ad in 5 seconds

Cookies

This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.