Updated my post on the Anubis attack on Mid South Pulmonary Specialists after getting additional info from Anubis.

It seems they used their wiper to delete all of MSPS's backups, and then encrypted all of their systems.

That sounds pretty grim. MSPS has not posted anything (perhaps they can't) or issued any notice anywhere about whether patient care has been affected at all by any breach.

https://databreaches.net/2025/12/07/theyve-escaped-a-lot-of-media-attention-but-anubis-raas-is-a-threat-to-the-medical-sector/

#HIPAA #healthsec #cybersecurity #databreach #ransomware #Anubis #wiper #backups #incidentresponse

@campuscodi @amvinfe

They’ve escaped a lot of media attention, but Anubis RaaS is a threat to the medical sector (1) – DataBreaches.Net

Although many ransomware gangs no longer encrypt victims and focus on exfiltration and extortion, some groups continue to encrypt. Anubis RaaS is one of them. S

DataBreaches.Net

I commented on an attack on Trumbull County, Ohio, by Anubis that @amvinfe reported this week. I will continue to try to follow up, but in the meantime, I posted this:

"Tell the truth, or someone will tell it for you — Trumbull County, Ohio edition."
https://databreaches.net/2025/12/09/tell-the-truth-or-someone-will-tell-it-for-you-trumbull-county-ohio-edition/

#databreach #ransomware #wiper #govsec #incidentresponse #transparency #Anubis #Trumbull_County

Tell the truth, or someone will tell it for you — Trumbull County, Ohio edition – DataBreaches.Net

Over at SuspectFile , Marco A. De Felice reports: Trumbull County (Ohio) was hit by a severe cyberattack in the first days of November 2025, carried out by the

DataBreaches.Net

Anubis hasn't really had a lot of media coverage, but @amvinfe's post about the attack on Mid South Pulmonary & Sleep Specialists was a wake-up call for me. So I took a look at Anubis's dark web leak site and saw they added -- and leaked -- five U.S. healthcare entities in November.

Given that they are not loath to encrypt and wipe victims' data... well... yikes.

My post:
https://databreaches.net/2025/12/07/theyve-escaped-a-lot-of-media-attention-but-anubis-raas-is-a-threat-to-the-medical-sector/

#databreach #ransomware #Anubis #HealthSec #cybersecurity #HIPAA #wiper

They’ve escaped a lot of media attention, but Anubis RaaS is a threat to the medical sector (1) – DataBreaches.Net

Although many ransomware gangs no longer encrypt victims and focus on exfiltration and extortion, some groups continue to encrypt. Anubis RaaS is one of them. S

DataBreaches.Net

Predatory Sparrow’s toolkit and chain-of-execution highlight destructive-sabotage best practices for defenders:
- Multi-stage batch scripts with hostname checks (avoid accidental collateral).
- Scheduled-task detonation (msrun.bat → 23:55) and NIC disable via PowerShell.
- Log wiping (wevtutil) and BCD/shadow-copy removal to prevent recovery.
- XOR-encrypted configs (msconf.conf), encrypted payloads, and precise target enumeration.

Detection & response suggestions: immutable offline backups, firmware-level integrity checks, EDR + OT anomaly telemetry correlation, and scheduled-task auditing. Discuss what telemetry you’d add to catch the staging phase - then follow @technadu for more IOCs and deep dives.

#ThreatIntel #Wiper #IR #EDR #OTSecurity #ICS #TTPs #InfoSec

25 October 2025 - Daily Drawing Day 298
#20252025Challenge
The car's MOT is just around the corner, so I thought I'd change the wiper blades today. Now to wait for some rain to really appreciate them. ☔

#cars #DIY #Wiper #car #車 #メカニック #ワイパー #自動車 #🚙

Watch the time lapse video of this drawing on YouTube Shorts: https://youtube.com/shorts/W0AfWAEB8Us

See the latest at https://darlosworld.bsky.social

The 2025 20-25 Challenge.

This year let’s get better at something by finding a little practice time most days, in my case drawing. - Do your activity for at least 25 minutes, at least 25 days per month.
- Use the hashtag #20252025Challenge on social media etc to track your progress
- Also use the hashtag to cheer on others.

That’s about it!

Have fun with your activities, whatever they may be!

Drawing, programming, dancing, cooking, make up, reading, languages, gardening, mastering high fives, sewing, astrophysics, vcr clock setting ...

#challengeyourself #challenge #Drawing #drawings #illustration #newyearsresolution #25minutes #xppen #clipstudiopaint #dailydrawing #イラスト #クリップスタジオ #絵 #絵画 #絵描きさんと繋がりたい #drawingoftheday #一日一絵 #art #digitalart #oc #一次創作

HybridPetya – Ransomware omijający zabezpieczenie UEFI Secure Boot

Badacze bezpieczeństwa z firmy ESET odkryli nowy wariant ransomware przypominający doskonale wszystkim znany Petya/NotPetya, rozszerzony o możliwość przejmowania systemów operacyjnych uruchamianych ze wsparciem UEFI. Malware wykorzystuje podatność CVE-2024-7344do ominięcia mechanizmu UEFI Secure Boot. W najnowszych systemach podatność ta została załatana, jednak schemat działania oprogramowania, tzn. wykorzystanie eksploitów na poziomie firmware...

#WBiegu #Notpetya #Petya #Ransomware #Secureboot #Wiper

https://sekurak.pl/hybridpetya-ransomware-omijajacy-zabezpieczenie-uefi-secure-boot/

HybridPetya - Ransomware omijający zabezpieczenie UEFI Secure Boot

Badacze bezpieczeństwa z firmy ESET odkryli nowy wariant ransomware przypominający doskonale wszystkim znany Petya/NotPetya, rozszerzony o możliwość przejmowania systemów operacyjnych uruchamianych ze wsparciem UEFI. Malware wykorzystuje podatność CVE-2024-7344do ominięcia mechanizmu UEFI Secure Boot. W najnowszych systemach podatność ta została załatana, jednak schemat działania oprogramowania, tzn. wykorzystanie eksploitów na poziomie firmware...

Sekurak
New Anubis RaaS includes a wiper module

Anubis RaaS now includes a wiper module, permanently deleting files. Active since Dec 2024, it launched an affiliate program in Feb 2025.

Security Affairs
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine - Cisco Talos observed a destructive attack on a critical infrastructure entity within Ukra... https://blog.talosintelligence.com/pathwiper-targets-ukraine/ #landingpagetopstory #threatadvisory #topstory #ukraine #wiper #apt
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine

Cisco Talos observed a destructive attack on a critical infrastructure entity within Ukraine, using a previously unknown wiper we are calling “PathWiper.”

Cisco Talos Blog

👾 Chaos is a #RaaS that also acts as a #wiper, RAT, or even #DDoS botnet.

🎯 It targets both large companies across different industries and SMEs with weak #cybersecurity posture.

👉 Learn more & collect #IOCs: https://any.run/malware-trends/chaos/?utm_source=mastodon&utm_medium=post&utm_campaign=chaos&utm_content=linktomtt&utm_term=050525

Chaos Ransomware – Malware Trends Tracker by ANY.RUN

Chaos RaaS encrypts data on both Windows and Linux endpoints and demands ransom in Bitcoin.

Chaos Ransomware | Malware Trends Tracker