Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

AI-Driven Ransomware FunkSec Targets 85 Victims Using Double Extortion Tactics

The Hacker News by The Hacker News
January 18, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Cybersecurity researchers have shed light on a nascent artificial intelligence (AI) assisted ransomware family called FunkSec that sprang forth in late 2024, and has claimed more than 85 victims to date.

“The group uses double extortion tactics, combining data theft with encryption to pressure victims into paying ransoms,” Check Point Research said in a new report shared with The Hacker News. “Notably, FunkSec demanded unusually low ransoms, sometimes as little as $10,000, and sold stolen data to third parties at reduced prices.”

FunkSec launched its data leak site (DLS) in December 2024 to “centralize” their ransomware operations, highlighting breach announcements, a custom tool to conduct distributed denial-of-service (DDoS) attacks, and a bespoke ransomware as part of a ransomware-as-a-service (RaaS) model.

A majority of the victims are located in the U.S., India, Italy, Brazil, Israel, Spain, and Mongolia. Check Point’s analysis of the group’s activity has revealed that it may be the likely work of novice actors who are seeking to attract notoriety by recycling the leaked information from previous hacktivist-related leaks.

Cybersecurity

According to Halcyon, FunkSec is notable for the fact that it functions both as a ransomware group and data broker, peddling stolen data to interested buyers for $1,000 to $5,000.

It has been determined that some members of the RaaS group engaged in hacktivist activities, underscoring a continued blurring of boundaries between hacktivism and cybercrime, just as nation-state actors and organized cybercriminals are increasingly exhibiting an “unsettling convergence of tactics, techniques, and even objectives.”

They also claim to target India and the U.S., aligning themselves with the “Free Palestine” movement and attempting to associate with now-defunct hacktivist entities like Ghost Algeria and Cyb3r Fl00d. Some of the prominent actors associated with FunkSec are listed below –

  • A suspected Algeria-based actor named Scorpion (aka DesertStorm) who has promoted the group on underground forums such as Breached Forum
  • El_farado, who emerged as a main figure advertising FunkSec after DesertStorm’s ban from Breached Forum
  • XTN, a likely associate who is involved in an as-yet-unknown “data-sorting” service
  • Blako, who has been tagged by DesertStorm along with El_farado
  • Bjorka, a known Indonesian hacktivist whose alias has been used to claim leaks attributed to FunkSec on DarkForums, either pointing to a loose affiliation or their attempts to impersonate FunkSec

The possibility that the group may also be dabbling in hacktivist activity is evidenced by the presence of DDoS attack tools, as well as those related to remote desktop management (JQRAXY_HVNC) and password generation (funkgenerate).

“The development of the group’s tools, including the encryptor, was likely AI-assisted, which may have contributed to their rapid iteration despite the author’s apparent lack of technical expertise,” Check Point pointed out.

The latest version of the ransomware, named FunkSec V1.5, is written in Rust, with the artifact uploaded to the VirusTotal platform from Algeria. An examination of older versions of the malware reveals references to FunkLocker and Ghost Algeria in the ransomware notes. Most of these specimens were uploaded from Algeria and possibly by the developer themselves, suggesting that the threat actor is from the country.

The ransomware binary is configured to recursively iterate over all directories and encrypt the targeted files, but not before elevating privileges and taking steps to disable security controls, delete shadow copy backups, and terminate a hard-coded list of processes and services.

Cybersecurity

“2024 was a very successful year for ransomware groups, while in parallel, the global conflicts also fueled the activity of different hacktivist group,” Sergey Shykevich, threat intelligence group manager at Check Point Research, said in a statement.

“FunkSec, a new group that emerged lately as the most active ransomware group in December, blurs the lines between hacktivism and cybercrime. Driven by both political agendas and financial incentives, FunkSec leverages AI and repurposes old data leaks to establish a new ransomware brand, though real success of their activities remains highly questionable.”

The development comes as Forescout detailed a Hunters International attack that likely leveraged Oracle WebLogic Server as an initial entry point to drop a China Chopper web shell, which was then used to perform a series of post-exploitation activities that ultimately led to the deployment of the ransomware.

“After gaining access, the attackers conducted reconnaissance and lateral movement to map the network and escalate privileges,” Forescout said. “The attackers used a variety of common administrative and red teaming tools for lateral movement.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
Taking the Pain Out of Cybersecurity Reporting: A Practical Guide for MSPs

Taking the Pain Out of Cybersecurity Reporting: A Practical Guide for MSPs

Recommended.

China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems

China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems

October 31, 2025
Cleveland Fed’s Hammack casts doubt on interest rate cuts amid inflation worries

Cleveland Fed’s Hammack casts doubt on interest rate cuts amid inflation worries

August 22, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
How Ceros Gives Security Teams Visibility and Control in Claude Code

How Ceros Gives Security Teams Visibility and Control in Claude Code

March 19, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio