Top Categories


todayFebruary 26, 2024

News Mjolnir Security

Mjolnir Shield

Overview Mjolnir Security’s Post-Incident Response Restoration Service is designed to assist organizations in efficiently recovering from cybersecurity incidents. By focusing on rebuilding and enhancing IT, network, and security infrastructures, Mjolnir Security ensures that businesses not only return to their operational status quickly but also emerge stronger and more resilient against [...]

Anubis Android Malware

News Mjolnir Security todayMay 29, 2022 274 1

share close

Anubis first appeared on Russian hacking forums in 2016, shared as an open-source banking trojan with instructions on implementing its client and components.

In the years that followed, Anubis received further development work, and its newer code continued to be openly shared between actors.

In 2019, the malware added what appeared to be an almost functional ransomware module and found its way into Google’s Play Store through fake apps.

In 2020, Anubis returned through large-scale phishing campaigns, targeting 250 shopping and banking apps.

Anubis will display fake phishing login forms when users open up apps for targeted platforms to steal credentials. This overlay screen will be shown over the real app’s login screen to make victims think it’s a legitimate login form when in reality, inputted credentials are sent to the attackers.

There is no concrete information on the actors who currently distribute Anubis, as they were careful enough to hide their C2 infrastructure registration trace.

In the last week, our intelligence analysts identified new domains used to spread the malware campaign.

You can find the IOCs here:

Written by: Mjolnir Security

Previous post

todayFebruary 3, 2021

  • 127
  • 1

News Mjolnir Security

Fall of Emotet

On January 27, 2021, news broke from Europol that a collaborative effort had effectively taken down and disrupted one of the most significant botnets in the past decade – Emotet. ...

Similar posts