Funksec Ransomware Teams Up with Another Ransomware Group to Double Down on Targets

Funksec Ransomware Teams Up with Another Ransomware Group to Double Down on Targets

FunkSec is a relatively new but highly active ransomware group that, as of this writing, has targeted several dozen victims across industries like government, banking, communications, and education. In a recent blog post, the group announced a partnership with another ransomware outfit, FSociety, aiming to carry out attacks more efficiently.

This week, SonicWall Capture Labs research team analyzed the group’s malware, known as FunkLocker ransomware. Interestingly, rather than demanding massive payouts, FunkSec typically requests just 0.1 Bitcoin. This suggests they may be pursuing a “churn and burn” strategy — favoring a quick turnover approach to rapidly generate revenue.

Infection Cycle

Upon execution, it spawns legitimate Windows processes to do system reconnaissance.

Figure 1: Legitimate Windows processes are spawned upon execution of malware

Figure 1: Legitimate Windows processes are spawned upon execution of malware

It uses PowerShell to check for certain system policies in the Windows registry such as internet settings, installed system certificates, current control set code integrity settings, etc.

Figure 2: Powershell.exe is used to check various system registry settings

Figure 3: Disabling Current Control Set CI or Code integrity allows applications that might not meet security standards to run on the system.

 

Read more : Endpoint Security in 2025: Predicting the Trends That Will Shape the Future of Cyber Defense

 

It also tries to disable certain services using sc.exe.

Figure 4: Command line window that shows certain services being disabled

It will then encrypt target files, add the “.funksec”  file extension and then reboot the system.

Figure 5: Encrypted files with .funksec file extension

Upon reboot, the victim can find a ransom note on the desktop that asks for roughly the equivalent of $10,000 in Bitcoin in exchange for decrypting the files.

Figure 6: Ransom note on the victim’s machine

On the Funksec TOR website, it displays all of its alleged victims which span across different industries

Figure 7: Funksec TOR website displaying high-profile victims

Funksec’s website also features a marketplace where other cybercriminal groups can sell data, which may not necessarily be data stolen by Funksec.

Figure 8: Funksec hosted marketplace for cybercriminals

Its forum site is very active and has recently announced its partnership with another ransomware group.

Figure 9: Funksec announces partnership with FSociety

One of the latest threads created shows an example of how this cybercriminal group has been in correspondence with another alleged victim. The operators emphasize the low ransom payment and that they are not interested in negotiation.

Figure 10: Correspondence with an alleged victim

SonicWall Capture Labs provides protection against this threat via the following signature:

  • GAV:Funklocker.RSM (Trojan)

This threat is also detected by SonicWall Capture ATP w/RTDMI and the Capture Client endpoint solutions.

 

Source : SonicWall Website

Share this story

Leave A Comment