Home AI AI-Driven FunkSec Ransomware: Free Decryptor Now Available

AI-Driven FunkSec Ransomware: Free Decryptor Now Available

0

Avast researchers, in collaboration with international law enforcement, have published a free decryptor for victims of the now-defunct FunkSec ransomware.

The public release comes after thorough victim assistance efforts and the effective dismantling of the ransomware operation.

This intervention offers a lifeline to the estimated 113 known victims who were targeted between December 2024 and March 2025, as identified through leak site records and sample submissions.

With the ransomware’s infrastructure considered neutralized, the decryptor is now freely available, enabling users to restore encrypted files without succumbing to extortion.

back up your encrypted files

Anatomy of FunkSec Operations

FunkSec’s operational timeline shows classic trends in modern cyber extortion with a slight twist: the first victims appeared on the ransomware group’s leak site on December 4, 2024, more than a week before the initial sample surfaced on VirusTotal.

This suggests FunkSec may have initially relied on data theft and blackmail before introducing data encryption capabilities.

On December 31, the first working ransomware payload was uploaded, and by mid-March 2025, the last known infection had occurred.

A distinguishing technical aspect is FunkSec’s partial reliance on AI: the group reportedly leveraged artificial intelligence for drafting phishing lures and developing attack tools, although human operators still handled about 80% of their infrastructure and campaigns.

While dubbed ‘AI-powered,’ the ransomware code itself, written in Rust, does not exhibit advanced AI-driven autonomous infection or evasion. Instead, AI augmented traditional tactics, facilitating criminal scale and operational agility.

Decryption Details

Technical analysis indicates FunkSec ransomware relies on the orion-rs cryptographic library (version 0.17.7), implementing file encryption with the Chacha20 algorithm alongside Poly1305 for message authentication.

According to the report, files are processed in 128-byte blocks, each appended with 48 bytes of additional metadata, resulting in significantly increased file size around 37% larger.

Notably, the malware targets all local drives, encrypting files except for several common document, archive, and system formats (including .docx, .xlsx, .pdf, .zip, and .exe). Before file locking, FunkSec forcibly terminates numerous application processes and critical system services to maximize file access and disrupt forensic response.

Distinctive artifacts include affected files renamed with the “.funksec” extension and personalized ransom notes (“README-{random}.md”) dropped into each encrypted folder.

“.funksec” extension

Several samples also attempted to download images from Imgur to serve as desktop wallpaper, though these dependencies often rendered the malware ineffective.

Victims with encrypted data should promptly download the appropriate 64-bit or 32-bit decryptor binary matching their system architecture directly from Avast’s official resources.

The tool launches as a user-friendly wizard, prompting users to select drives or folders for decryption and offering an optional backup step to safeguard original encrypted files.

Administrator privileges are advised to ensure thorough remediation. Once executed, the decryptor restores access to compromised data, allowing organizations to recover without payment.

Indicators of Compromise (IOCs)

IOC TypeValue
Ransomware Samplec233aec7917cf34294c19dd60ff79a6e0fac5ed6f0cb57af98013c08201a7a1c
Initial Source Code7e223a685d5324491bcacf3127869f9f3ec5d5100c5e7cb5af45a227e6ab4603

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Exit mobile version