#anubis

2025-12-11

wanderer is now the first tchncs thing with #anubis in front of it (partially) ๐Ÿ‘€
if (apart from sporadic timeouts - which hopefully now happen much less if at all) something seems broken - such as federation - please dm me. however so far, things luckily seem fine.

its still somewhat experimental. just as with claude yesterday, today i had to deny amazonbot by hand which i dont think should be required...

dashboard source: github.com/TecharoHQ/anubis/di

Alfred J. Kwak (audiokontor) โ˜•mc@toot.houbahouba.de
2025-12-10

plan is to get all my pub-facing sites behind #anubis by end of 25. besides building a community portal with a bunch of services - IdP integration a must. yeehaw ;) anubis.techaro.lol/

2025-12-10

trying #anubis - while it looks like claude was stopped many times, it somehow still managed to request and download tons of forgejo archives - this used the example that challenged for useragents that include mozilla. i am denying now but at the same time i am confused

(this pretty much made forgejo fill up something around 1.5T of disk space this day)

2025-12-09

Moved ymt.fi #domain from #CloudFlare to #BunnyCDN. Not only bc of their latest blackout (which actually didnโ€™t affect us), but also to move all tech services to #EU.

1) Would you recommend something else instead? (Plz donโ€™t say self-#hosting. My brain hurts already.) I was lured by Bunnyโ€™s โ€first 20 000 000 queries for freeโ€ offer.

2) CloudFlare has built-in #AI crawler blocking. Donโ€™t see anything like that at Bunny. So do I now have to setup #Anubis for the site or smt? (Hello, brain hurt.)

Dissent Doe :cupofcoffee:PogoWasRight@infosec.exchange
2025-12-09

Updated my post on the Anubis attack on Mid South Pulmonary Specialists after getting additional info from Anubis.

It seems they used their wiper to delete all of MSPS's backups, and then encrypted all of their systems.

That sounds pretty grim. MSPS has not posted anything (perhaps they can't) or issued any notice anywhere about whether patient care has been affected at all by any breach.

databreaches.net/2025/12/07/th

#HIPAA #healthsec #cybersecurity #databreach #ransomware #Anubis #wiper #backups #incidentresponse

@campuscodi @amvinfe

Dissent Doe :cupofcoffee:PogoWasRight@infosec.exchange
2025-12-09

I commented on an attack on Trumbull County, Ohio, by Anubis that @amvinfe reported this week. I will continue to try to follow up, but in the meantime, I posted this:

"Tell the truth, or someone will tell it for you โ€” Trumbull County, Ohio edition."
databreaches.net/2025/12/09/te

#databreach #ransomware #wiper #govsec #incidentresponse #transparency #Anubis #Trumbull_County

Crazazy ๐Ÿ”œ 39c3 [โ˜Ž๏ธ:CRZY]crazazy@tiny.tilde.website
2025-12-09

So apparently, anti-bot filters are seeing #seamonkey as an AI agent. This means that the only AI blocker that seamonkey can get through now is #anubis , since the other ones don't even make an attempt at checking if you're legit

Also, I didn't hear codeberg switching to iocaine from anubis, they seem to have done that quietly

Seamonkey visiting codeberg. It has tripped iocaine, something the codeberg admins haven't even announced they were using as far as I'm awareScreenshot of guix.gnu.org on seamonkey
2025-12-08

๐“๐ก๐ž ๐ƒ๐š๐ญ๐š ๐๐ซ๐ž๐š๐œ๐ก ๐ญ๐ก๐ž ๐“๐ซ๐ฎ๐ฆ๐›๐ฎ๐ฅ๐ฅ ๐‚๐จ๐ฎ๐ง๐ญ๐ฒ ๐ƒ๐ž๐ง๐ข๐ž๐: ๐Ÿ‘๐Ÿ“๐ŸŽโ€ฏ๐†๐ ๐จ๐Ÿ ๐’๐ž๐ง๐ฌ๐ข๐ญ๐ข๐ฏ๐ž ๐ƒ๐š๐ญ๐š ๐๐ฎ๐›๐ฅ๐ข๐ฌ๐ก๐ž๐ ๐›๐ฒ ๐ญ๐ก๐ž ๐€๐ง๐ฎ๐›๐ข๐ฌ ๐†๐ซ๐จ๐ฎ๐ฉ

The group also claims to have remained active inside the network the entire time:
โ€œWe remained inside their network the entire time.โ€
โ€œWe watched them perform their security audit and collect artifactsโ€ฆ They prepared a report saying โ€˜Everything is fine and secure.โ€™ We laughed for a long time.โ€

suspectfile.com/the-data-breac

#Trumbull_County #Anubis #Ransomware #Infosec #HIPAA

โ€๐“ช๐“ต๐“ฌ๐“ฎ๐“ช๐–คalcea@alceawis.com
2025-12-08
So thats the #anubis story
https://www.theregister.com/2025/08/15/codeberg_beset_by_ai_bots/

Poor anubi.
#iocaine taking its job


#Brave and ico are not very compatible..
Now where to get a browser that is and supports "javascript: applets on #android ?

The #internet is getting annoying :blobcatnotlike:
#repost โ€ขacws #acws
Dissent Doe :cupofcoffee:PogoWasRight@infosec.exchange
2025-12-07

Anubis hasn't really had a lot of media coverage, but @amvinfe's post about the attack on Mid South Pulmonary & Sleep Specialists was a wake-up call for me. So I took a look at Anubis's dark web leak site and saw they added -- and leaked -- five U.S. healthcare entities in November.

Given that they are not loath to encrypt and wipe victims' data... well... yikes.

My post:
databreaches.net/2025/12/07/th

#databreach #ransomware #Anubis #HealthSec #cybersecurity #HIPAA #wiper

โ€๐“ช๐“ต๐“ฌ๐“ฎ๐“ช๐–คalcea@alceawis.com
2025-12-07
@Codeberg โ€ขacws #acws
Hey !
#Codeberg .. Where is #anubis ?!
:AnubisPensive:
Uploaded ThatsNotAnubis!.png
Andreu Casablanca ๐Ÿ€castarco@hachyderm.io
2025-12-07

I'm using #Anubis to protect our Forgejo instance from scrapper #bots, but it doesn't seem to be enough for "classic" malicious scanners that try thousands of paths looking for vulnerabilities.

Granted, presenting a challenge increases the cost for the malicious scanners, but at some point I'd like a smarter tool that detects what's happening and blocks any further attempt.

Does anyone know about good solutions for this? I'm sure there must be something out there, I'm just ignorant about it.

#infosec #WebSecurity

2025-12-07

This year, 39% of our web traffic was done through scrapping bots. This is not our mission, and a load we do not want to impose on our host, so we are deploying #anubis to protect the wiki as a first step.

Do not be alarmed and let's hope this will improve bandwidth usage.

Dissent Doe :cupofcoffee:PogoWasRight@infosec.exchange
2025-12-07

@amvinfe Great reporting!

"โ€œCan you imagine our outrage when we saw the VPN domain administratorโ€™s password was โ€˜Passwordโ€™?

(UGH)

and...

" In one night, we struck them and paralyzed their entire network. To this day, they still canโ€™t do anything. And they wonโ€™t. We deleted the decryption key because they didnโ€™t care about their clients, their own organization, and simply abandoned the negotiations.โ€

From that, it sounds like there were some negotiations. Any idea of why they were abandoned?

#databreach #ransomware #Anubis

2025-12-07

๐ƒ๐š๐ญ๐š ๐๐ซ๐ž๐š๐œ๐ก ๐š๐ญ ๐Œ๐ข๐ ๐’๐จ๐ฎ๐ญ๐ก ๐๐ฎ๐ฅ๐ฆ๐จ๐ง๐š๐ซ๐ฒ & ๐’๐ฅ๐ž๐ž๐ฉ ๐’๐ฉ๐ž๐œ๐ข๐š๐ฅ๐ข๐ฌ๐ญ๐ฌ: ๐€๐ง๐ฎ๐›๐ข๐ฌ ๐’๐ฉ๐ž๐š๐ค๐ฌ

Mid South Pulmonary & Sleep Specialists (MSPS), a major clinical center specializing in respiratory diseases and sleep disorders in Tennessee, has been hit by a severe cyberattack claimed by the ransomware group Anubis. The attackers provided SuspectFile.com with both technical and operational details of the incident.

#MSPS #Anubis #Ransomware #Infosec #HIPAA

2025-12-06

New post from #Anubis : Trumbull County
More at : ransomlook.io/group/Anubis #Ransomware

2025-12-06
2025-12-04

New post from #Anubis : Smith Fire Systems
More at : ransomlook.io/group/Anubis #Ransomware

Michael Simonsrotnroll666
2025-12-02

24 hours inโ€ฆ denied more than 20k requests of crawlers, clients and the like. But also handed out just short a few million challenges to moderate and mild suspicious clients. In the default configuration, that is to say.

Wow.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst