On April 7, 2026, cancer patients arrived for chemotherapy at Brockton Hospital's Greene Cancer Center and were told to go home. Ambulances were rerouted to alternate facilities. Prescriptions could not be filled. Electronic health records went offline. The cause was Anubis — a Ransomware-as-a-Service group that struck Signature Healthcare's information systems on April 6, 2026, exfiltrating more than 2 terabytes of sensitive patient data in what has become the most operationally disruptive healthcare cyberattack in Massachusetts in years. The Anubis ransomware attack on Signature Healthcare is not a data breach in the conventional sense: the group stated it did not encrypt clinical systems, deploying instead a pure exfiltration-and-extortion model that leaves backup resilience entirely beside the point.

Anubis surfaced on Russian-language cybercrime forums in late 2024 as what researchers believe is a rebrand of the Sphinx ransomware operation, upgraded with a capability that distinguishes it from every other major RaaS group: an optional wipe mode that permanently overwrites file contents even if the ransom is paid. In under 18 months, the group has claimed over 70 victims across healthcare, construction, and professional services in the US, Australia, Canada, and France. Its affiliate model offers three extortion tiers — standard encryption (80% affiliate cut), data theft (60% affiliate cut), and negotiation-assisted operations (50/50 split) — giving affiliates granular control over the pressure model they deploy.

The attack arrives during one of the most intensive periods of healthcare ransomware activity on record. In the same six-week window, Medusa ransomware shut down 35 clinics at the University of Mississippi Medical Center for nine days, and the Lynx group struck ACN Healthcare. CISA's April 2026 advisory documented a clear shift: ransomware operators are increasingly skipping encryption entirely, weaponising data theft and publication threats against organisations that believe backup resilience makes them immune. With 2TB of patient records under Anubis control and Signature Healthcare staying silent on negotiations, the window to respond is narrowing.

How the Anubis RaaS attack chain unfolds: phishing to exfiltration

Anubis affiliates gain initial access through two primary vectors: spear-phishing emails carrying malicious attachments or links targeting hospital staff, and exploitation of exposed Remote Desktop Protocol services — a persistent vulnerability across healthcare IT environments where legacy clinical systems often require persistent RDP access for maintenance.

Once inside, Anubis affiliates escalate privileges using access token manipulation (MITRE ATT&CK T1134.002), impersonating high-privilege accounts to move laterally through clinical and administrative network segments. Discovery tooling maps the environment for the highest-value data stores — EHR databases, billing systems, patient records archives. Exfiltration precedes payload deployment; in the Signature Healthcare case, 2TB was removed before any encryption or disruption activity.

The ransomware payload is invoked via command-line with parameters including /KEY= (initiates ECIES encryption), /elevated (forces administrative execution), /PATH= or /PFAD= (targets specific directories), and optionally /WIPEMODE (activates irreversible file overwrite). The command vssadmin delete shadows /for=norealvolume /all /quiet eliminates Volume Shadow Copies, blocking native recovery. Broad service termination targets backup utilities, database engines, security software, and productivity tools before encryption begins.

In the Brockton case, Anubis affiliates opted for the data-theft-only model — no encryption was deployed against clinical systems. This approach is increasingly common: it achieves the same extortion outcome without triggering the operational chaos that full encryption causes, which paradoxically increases media attention and law enforcement pressure on the operators.

1

Initial Access — Phishing or exposed RDP

Spear-phishing emails or exploitation of internet-facing RDP services provide the initial foothold. Healthcare environments with legacy clinical systems are disproportionately exposed.

2

Privilege Escalation — Token manipulation (T1134.002)

Anubis affiliates manipulate access tokens to impersonate high-privilege accounts, bypassing UAC and gaining administrative access across the environment.

3

Lateral Movement & Discovery — Clinical and admin network mapping

Affiliates enumerate EHR databases, billing systems, and patient record stores. Network segmentation failures allow movement from administrative systems into clinical networks.

4

Exfiltration — 2TB extracted before disruption

Data is exfiltrated to Anubis-controlled infrastructure before payload deployment. In Signature Healthcare's case, 2TB of patient data was removed. Exfiltration is the primary extortion lever.

5

Extortion — Dark web listing and ransom demand

Anubis lists the victim on its dark web portal and initiates ransom negotiations. In the Brockton attack, Anubis later removed Signature Healthcare from the leak site — a behavior consistent with active payment negotiations.

2TB of stolen patient data: what Brockton Hospital patients now face

Anubis claimed to have exfiltrated more than 2 terabytes of what it described as 'critical' and 'sensitive' patient information. At scale, 2TB of structured healthcare data can contain hundreds of thousands of complete patient records: names, dates of birth, Social Security numbers, insurance identifiers, medication histories, diagnostic records, and billing information.

Signature Healthcare operates Brockton Hospital, New England's fourth-largest hospital by bed count, and a network of clinics serving southeastern Massachusetts. The organisation employs over 2,400 staff and handles tens of thousands of patient interactions annually. The patient population is disproportionately low-income and uninsured — a demographic with limited capacity to monitor and respond to identity theft downstream of a data breach.

For patients, the immediate risks are identity theft and healthcare fraud — the use of stolen insurance identifiers to file fraudulent claims or obtain controlled substances. Medical identity theft is particularly damaging because it can corrupt a patient's health record with false diagnoses and medications, creating dangerous situations in future emergency care.

Signature Healthcare has not confirmed the data contents or notified affected patients as of April 18, 2026. Under HIPAA's Breach Notification Rule, organisations have 60 days from discovery to notify affected individuals. The clock started on April 6.

Anubis RaaS group profile: Sphinx rebrand, 70 victims, wiper upgrade

Anubis is believed to be a direct rebrand of the Sphinx ransomware operation — code-level analysis by multiple threat intelligence firms shows near-identical functionality between late Sphinx samples and early Anubis builds, indicating a rebrand rather than a fork or independent development.

The group's operational profile bears the hallmarks of Russian-speaking RaaS operators: targeting patterns consistently exclude former Soviet states, recruitment occurs on Russian-language cybercrime forums, and operational timing aligns with Eastern European business hours. Six-plus months of victim listings show a clear preference for healthcare organisations in North America — a sector with high-value regulated data, chronic underinvestment in security tooling, and strong financial and regulatory pressure to pay ransoms quickly to restore patient care.

Anubis's wiper capability sets it apart from every other major RaaS group active in April 2026. Most ransomware groups threaten data destruction as a negotiating lever but lack a reliable mechanism to execute it. Anubis has built the capability into the payload itself — the /WIPEMODE parameter triggers irreversible file overwrite during the same execution that handles encryption. This means a single affiliate deployment can pivot from a recoverable encryption event to a permanent destruction event at the operator's discretion, without redeploying any tooling.

As the [Qilin BYOVD EDR-silencing campaign](/blog/qilin-byovd-edr-silencing) demonstrated in early 2026, modern RaaS groups are investing in capabilities specifically designed to defeat the defenses hospitals have deployed since the Change Healthcare attack in 2024.

Anubis operates a flexible affiliate-driven RaaS model that goes beyond simple ransomware deployment. The wiper mode is not a threat — it is a built-in capability. Once the affiliate deploys with /WIPEMODE, no ransom payment recovers the data.

Bitsight Threat Research — Anubis Ransomware Group Overview and Evolution

Indicators of compromise: detecting Anubis before the damage is done

Early detection of Anubis activity is possible if security teams are hunting for the right signals. The most actionable detection opportunity is the pre-deployment phase: the interval between initial access and payload execution where affiliates are conducting discovery and staging exfiltration.

Hunting priorities: anomalous RDP authentication events (particularly off-hours logons from external IPs or internal lateral movement over RDP); bulk file access or staging activity on file servers containing patient records; large outbound data transfers to non-standard destinations; and process execution of vssadmin with shadow copy deletion arguments. Any process invoking command-line parameters containing /KEY=, /elevated, /WIPEMODE, /PATH=, or /PFAD= should trigger an immediate alert and investigation.

Post-deployment indicators include files with the .anubis extension across multiple directories, zero-byte files (wipe mode artifact), and ransom note files in affected directories. Service termination events affecting backup agents, database services, and security software in rapid succession are a strong indicator of ransomware deployment in progress.

Organisations that experienced the GoAnywhere-Clop supply chain attacks in 2023 (detailed in the [CVE-2023-0669 analysis](/blog/cve-2023-0669-goanywhere-mft-rce-clop-ransomware)) will recognise the exfiltration-first model — Anubis is executing the same playbook against healthcare infrastructure.

Indicators of Compromise
ArtifactTypeSHA-256 (Truncated)
.anubisFile ExtensionEncrypted files renamed with this extension post-encryption
vssadmin delete shadows /for=norealvolume /all /quietCommandShadow copy deletion — recovery inhibition (T1490)
/WIPEMODECLI ParameterActivates irreversible file destruction mode in Anubis payload
/KEY= /elevated /PATH= /PFAD=CLI ParametersExecution parameters for Anubis ransomware payload
Zero-byte files across multiple directoriesFile ArtifactWipe mode execution signature — contents overwritten to 0 KB
Bulk outbound transfer + RDP lateral movement (off-hours)Network/BehavioralPre-deployment exfiltration staging — highest-value detection window

Any instance of msimg32.dll found outside C:\Windows\System32 is an active IOC. Isolate the host immediately. Full hashes and IOC lists are available via the Cisco Talos GitHub repository.

How hospitals can defend against Anubis ransomware right now

Healthcare organisations face a specific defensive challenge against Anubis: the group's data-theft-only model means encryption-centric defenses — immutable backups, snapshot recovery — provide no protection against the primary extortion mechanism. The backup is irrelevant if the 2TB of patient data is already on Anubis's exfiltration infrastructure. The defensive priority must shift upstream to preventing exfiltration in the first place.

Restrict and audit all RDP exposure immediately

Disable internet-facing RDP where not operationally required. Place remaining RDP access behind a VPN with MFA. Audit Active Directory for accounts with remote access privileges that do not require them. Anubis affiliates actively scan for exposed RDP services as a primary initial access vector — removing this exposure eliminates one of the two main entry points.

Deploy MFA on all remote access, administrative, and privileged accounts

Enforce hardware MFA or authenticator-app MFA on VPN, RDP, administrative consoles, and any account with access to patient data. Phishing-resistant FIDO2 keys provide the strongest protection against the spear-phishing initial access vector. SMS-based MFA is better than nothing but vulnerable to SIM-swap attacks targeting healthcare IT staff.

Segment clinical networks from administrative infrastructure

Implement network segmentation between clinical systems (EHR, imaging, infusion systems), administrative systems (billing, HR, email), and internet-facing infrastructure. Lateral movement from a compromised workstation to a clinical database should require traversing a firewall with explicit permit rules — not a flat network where any authenticated session can reach any system.

Hunt for VSS deletion commands and bulk file staging activity

Configure SIEM or EDR alerts for vssadmin delete shadows commands, wbadmin DELETE SYSTEMSTATEBACKUP, and bcdedit.exe /set recoveryenabled No — all standard ransomware pre-execution commands. Separately, alert on any process accessing more than a threshold number of files (e.g., 500+) within a short window. This behavioral detection catches both encryption and exfiltration staging.

Implement data loss prevention on egress for EHR and billing data

Deploy DLP policies that alert or block large outbound transfers of files matching PHI patterns (HL7, FHIR, structured billing formats). 2TB of patient data does not exfiltrate instantaneously — there is a staging and transfer window during which network-level DLP provides a detection opportunity. Configure egress alerts for transfers above 10GB to non-approved destinations.

Why healthcare is Anubis's preferred target: high-value data, maximum extortion pressure

Of Anubis's 70+ confirmed victims, healthcare organisations appear most frequently — a deliberate targeting decision, not opportunism. Healthcare organisations hold three attributes that make them uniquely profitable for data-extortion operations.

First, patient data has the highest per-record value of any data class on dark web markets. A complete healthcare record — containing insurance identifiers, diagnostic history, medication records, and billing data — sells for $250–$1,000 per record versus $5–$25 for a financial record. 2TB of structured patient data represents potential secondary market value in the tens of millions of dollars, independent of any ransom payment.

Second, healthcare organisations face patient safety obligations that create maximum urgency to resolve incidents. A hospital cannot tolerate weeks of downtime. Every hour that EHR systems remain offline is an hour that clinical staff are operating with reduced situational awareness — a fact Anubis operators explicitly leverage in ransom negotiations.

Third, healthcare is subject to HIPAA's mandatory breach notification requirements. Even if an organisation believes it can absorb the operational disruption without paying, the regulatory clock — 60 days to individual notification, potential OCR investigation, fines of up to $1.9 million per violation category — creates a separate financial pressure that ransom operators factor into their demands. Anubis's removal of Signature Healthcare from its leak site suggests the negotiation is alive. The ransom is almost certainly less than the breach notification and regulatory exposure.

The bottom line

The Anubis ransomware attack on Signature Healthcare is a template for the 2026 healthcare extortion playbook: no encryption, no operational chaos, just 2TB of patient records on a dark web portal and a countdown clock. Backup resilience is irrelevant when the threat is publication. The fact that Anubis removed Signature Healthcare from its leak site means a negotiation is underway — not that the threat has passed. Patients of Brockton Hospital should assume their data is in the hands of a Russian-speaking criminal operation and act accordingly. For every healthcare security team reading this: your priority today is not your backup recovery time objective — it is your ability to detect and stop a 2TB exfiltration before it completes. Run a tabletop on that scenario this week.

Frequently asked questions

What is Anubis ransomware?

Anubis is a Ransomware-as-a-Service (RaaS) operation that emerged on Russian-language cybercrime forums in late 2024. It is believed to be a rebrand of the Sphinx ransomware operation. Anubis is distinctive for offering an optional wipe mode that permanently destroys file contents — making recovery impossible even if the ransom is paid. As of April 2026, the group has claimed over 70 victims across healthcare, construction, and professional services globally.

How does Anubis ransomware work?

Anubis gains initial access via spear-phishing emails or exploitation of exposed Remote Desktop Protocol (RDP) services. After establishing persistence and escalating privileges using token manipulation (MITRE T1134.002), affiliates conduct lateral movement, exfiltrate data, and then deploy the payload. Files are encrypted using the Elliptic Curve Integrated Encryption Scheme (ECIES) and renamed with the .anubis extension. Volume Shadow Copies are deleted to prevent recovery. Affiliates can optionally activate wipe mode for irreversible destruction.

What data did Anubis steal from Signature Healthcare?

Anubis claimed to have stolen more than 2 terabytes of 'critical' and 'sensitive' patient information from Signature Healthcare's Brockton Hospital. The data was listed on Anubis's dark web extortion portal. Signature Healthcare declined to confirm or deny the data contents or any ransom negotiations. Anubis subsequently removed the hospital from its leak site — a behavior typically indicating active negotiation or payment.

How did the Brockton Hospital ransomware attack affect patients?

The April 6, 2026 attack forced Brockton Hospital to operate on paper-based downtime procedures for over 12 days. Ambulances were diverted to alternate facilities. Chemotherapy infusions at the Greene Cancer Center were canceled on April 7. The patient portal went offline. Lab work and medical testing faced significant delays. Prescription filling was halted at Signature Healthcare pharmacies. Surgeries continued, but with manual processes and degraded situational awareness.

What is Anubis wipe mode and why is it dangerous?

Anubis's wipe mode, activated via the /WIPEMODE command-line parameter, irreversibly overwrites file contents rather than encrypting them. Unlike ransomware encryption — where paying the ransom restores data — wipe mode produces unrecoverable file destruction. This gives Anubis affiliates a second extortion lever beyond encryption: the threat of permanent data destruction if no ransom is paid. It also makes Anubis attacks categorically more dangerous than standard ransomware deployments.

Is Anubis a new ransomware group?

Anubis first appeared in late 2024 and is considered a rebrand of the earlier Sphinx ransomware operation, with code-level similarities indicating a direct lineage rather than a fork. While relatively new as a named operation, Anubis has moved quickly — claiming over 70 victims in under 18 months. The group targets healthcare, construction, and professional services primarily across the US, Australia, Canada, and France, and operates a structured RaaS affiliate model with multiple extortion tiers.

How can hospitals defend against Anubis ransomware?

Key defenses include: enforcing MFA on all remote access and RDP endpoints; disabling RDP where not required and placing it behind a VPN; conducting regular phishing simulation and awareness training; maintaining air-gapped or immutable backups following the 3-2-1 rule; deploying EDR with behavioral detection tuned for VSS deletion commands and the .anubis extension; and segmenting clinical networks from administrative systems to limit lateral movement impact on patient care systems.

What should you do if your organization is hit by Anubis?

Immediately isolate affected systems and preserve forensic evidence before any recovery steps. Contact CISA (1-888-282-0870) and the FBI Cyber Division. Do not pay the ransom without legal counsel — removing a victim from the leak site does not guarantee data deletion. Engage a forensic incident response firm to determine exfiltration scope. Notify affected patients per HIPAA Breach Notification requirements. Restore from the most recent air-gapped backup and validate integrity before reconnecting to the network.

Sources & references

  1. GovInfoSecurity — RaaS Gang Anubis Claims Signature Healthcare Data Theft
  2. HIPAA Journal — Brockton Hospital Ransomware Attack: Downtime Procedures to Continue for Two Weeks
  3. DataBreaches.Net — Brockton Hospital still dealing with aftermath of ransomware attack
  4. Comparitech — Cybercriminals give Brockton, MA hospital one week to pay ransom after hack
  5. Trend Micro — Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper
  6. Bitsight — Anubis: A Deep Dive into the Emerging Ransomware
  7. SOCRadar — Dark Web Profile: Anubis Ransomware
  8. SecurityWeek — Massachusetts Hospital Diverts Ambulances as Cyberattack Causes Disruption
  9. STAT News — Health care's biggest cybersecurity vulnerability is structural
  10. Barracuda Networks — Wipe, leak, extort: The hybrid playbook of Anubis ransomware
Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.