logo
Inside FunkSec: Kaspersky explores the evolution of AI-powered ransomware with password-gated capabilities

Inside FunkSec: Kaspersky explores the evolution of AI-powered ransomware with password-gated capabilities

Biz Bahrain07-07-2025
Kaspersky experts revealed the inner workings of FunkSec — a ransomware group that illustrates the future of mass cybercrime: AI-powered, multifunctional, highly adaptive and operating on volume with ransoms as low as $10,000 to maximize profits. Kaspersky's Global Research and Analysis Team (GReAT) constantly monitors the ransomware threat landscape, where attacks continue to rise. According to the company's latest State of Ransomware report, the share of users affected by ransomware attacks worldwide increased to 0.44% from 2023 to 2024, up by 0.02 percentage points. While this percentage may appear modest compared to other cyber threats, it reflects the fact that attackers typically prioritize high-value targets rather than mass distribution, making each incident potentially devastating. Within this evolving landscape, FunkSec has emerged as a particularly concerning threat. Active for less than a year since its emergence in late 2024, FunkSec has quickly surpassed many established actors by targeting government, technology, finance and education sectors. What sets FunkSec apart is its sophisticated technical architecture and AI-assisted development. The group packages full-scale encryption and aggressive data exfiltration into a single Rust-based executable, capable of disabling over 50 processes on victim machines and equipped with self-cleanup features to evade defenses. Beyond its core ransomware functionality, FunkSec has expanded its toolkit to include a password generator and a basic DDoS tool — both showing clear signs of code synthesis using large language models (LLMs). FunkSec's approach reflects the evolving landscape of mass cybercrime, combining advanced tools and tactics. Kaspersky's GReAT experts highlight the key features that define their operations: Password-Controlled Functionality GReAT experts discovered that FunkSec ransomware features a unique password-based mechanism that controls its operation modes. Without a password, the malware performs basic file encryption, while providing a password activates a more aggressive data exfiltration process in addition to encryption to steal sensitive data. FunkSec packs full-scale encryption, local exfiltration and self-cleanup into a single Rust binary—without a side-loader or a companion script. That level of consolidation is uncommon and gives affiliates a plug-and-play tool they can deploy almost anywhere. Use of AI in development Code analysis shows that FunkSec is actively using generative artificial intelligence to create its tools. Many parts of the code seem to be automatically generated rather than manually written. Signs of this generic placeholder comments (such as 'placeholder for actual check') and technical inconsistencies, like commands for different operating systems that don't align properly. Additionally, the presence of declared but unused functions—such as modules included upfront but never utilized — reflects how large language models combine multiple code snippets without pruning redundant elements. 'More and more, we see cybercriminals leveraging AI to develop malicious tools. Generative AI lowers barriers and accelerates malware creation, enabling cybercriminals to adapt their tactics faster. By reducing the entry threshold, AI allows even less experienced attackers to quickly develop sophisticated malware at scale,' comments Marc Rivero, Lead Security Researcher at Kaspersky's GReAT. High-volume, low-ransom strategy FunkSec demands unusually low ransom payments, sometimes as little as $10,000, and pairs this with the sale of stolen data at discounted prices to third parties. This strategy appears designed to enable a high volume of attacks, helping the group quickly establish its reputation within the cybercriminal underground. Unlike traditional ransomware groups that seek million-dollar ransoms, FunkSec employs a high-frequency, low-cost model — further underscoring its use of AI to streamline and scale operations. Expands beyond ransomware FunkSec has expanded its capabilities beyond the ransomware binary. Its dark leak site (DLS) hosts additional tools, including a Python-based password generator designed to support brute-force and password-spraying attacks, as well as a basic DDoS tool. Advanced evasion FunkSec employs advanced evasion techniques to avoid detection and complicate forensic analysis. The ransomware is capable of stopping over 50 processes and services to ensure thorough encryption of targeted files. Additionally, it includes a fallback mechanism to execute certain commands even if the user launching FunkSec lacks sufficient privileges. Kaspersky's products detect this threat as HEUR:Trojan-Ransom.Win64.Generic. To stay protected from ransomware attacks, Kaspersky experts recommend organizations follow these best practices to safeguard from ransomware: • Enable ransomware protection for all endpoints. There is a free Kaspersky Anti-Ransomware Tool for Business that shields computers and servers from ransomware and other types of malware, prevents exploits and is compatible with already installed security solutions. • Always keep software updated on all the devices you use to prevent attackers from exploiting vulnerabilities and infiltrating your network. • Focus your defense strategy on detecting lateral movements and data exfiltration to the internet. Pay special attention to outgoing traffic to detect cybercriminals' connections to your network. Set up offline backups that intruders cannot tamper with. Make sure you can access them quickly when needed or in an emergency. • Install anti-APT and EDR solutions, enabling capabilities for advanced threat discovery and detection, investigation and timely remediation of incidents. Provide your SOC team with access to the latest threat intelligence and regularly upskill them with professional training. All of the above is available within Kaspersky Expert Security framework. • Use the latest Threat Intelligence information to stay aware of the actual Tactics, Techniques, and Procedures (TTPs) used by threat actors.
• To protect the company against a wide range of threats, use solutions from Kaspersky Next product line that provide real-time protection, threat visibility, investigation and response capabilities of EDR and XDR for organizations of any size and industry. Depending on your current needs and available resources, you can choose the most relevant product tier and easily migrate to another one if your cybersecurity requirements are changing.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Scan or Scam? Kaspersky experts warn of the risks hidden behind QR codes
Scan or Scam? Kaspersky experts warn of the risks hidden behind QR codes

Biz Bahrain

timea day ago

  • Biz Bahrain

Scan or Scam? Kaspersky experts warn of the risks hidden behind QR codes

In today's digital world, QR codes are placed on almost everything – from yogurt containers and restaurant menus to museum exhibits, and even utility bills and parking lots. People use them to open websites, download apps, collect loyalty program points, make payments and transfer money, and even for charity donations. The accessible and practical technology is convenient for many, including cybercriminals, who have already rolled out a variety of QR-based schemes. Kaspersky experts have identified the top security risks when scanning QR codes: • Phishing and redirection to malicious sites: QR codes can direct users to fraudulent websites designed to steal personal or financial information, such as passwords and credit card numbers. Attackers can impersonate legitimate sites, such as banks or streaming services, and trick users into entering their credentials. • Malware download: Some QR codes can trigger the download of malicious applications that compromise the security of the user's device, especially if it is not protected against unauthorized installation. • Payment fraud: During special events or sales periods like holiday sales, a fake QR code can redirect users to make payments to fraudulent accounts. • Unsafe automatic connections: A QR code can also automatically connect the user to Wi-Fi networks controlled by cyber attackers, allowing them to intercept their communications. 'QR codes are a fertile ground for potential manipulation, especially as they appear in various everyday contexts such as receipts, flyers, and signage. Attackers have nearly endless possibilities to exploit them. As these codes have already become an integral part of our daily lives, it is essential for users to know how to use them safely and responsibly,' says Seifallah Jedidi, Head of Consumer Channel for META at Kaspersky. In order to not fall for a scam when scanning a QR code, Kaspersky experts recommend: • Verify the source: Scan QR codes only from trusted and known sources. Avoid scanning codes in public places that may have been tampered with. • Check the URL: If you really need to scan a publicly available code, verify that the web address it directed you to is legitimate before taking any action on this website. • Don't share personal information: Avoid entering sensitive information if you're not completely sure of the origin of the QR code. • Protect your digital life: Install a cybersecurity solution with anti-phishing and anti-fraud protection, such as Kaspersky Premium, on all your devices; it will alert you to any danger timely.

Syria Signs $800M Tartous Port Deal With Dubai-Based Company
Syria Signs $800M Tartous Port Deal With Dubai-Based Company

Gulf Insider

time2 days ago

  • Gulf Insider

Syria Signs $800M Tartous Port Deal With Dubai-Based Company

Syria has signed an $800-million agreement with Dubai-based DP World to redevelop the Tartous Port, state media reported on Sunday. The deal was signed in Damascus in the presence of self-appointed Syrian interim President Ahmad al-Sharaa. The agreement grants DP World a 30-year term to operate and upgrade Tartous, one of Syria's most strategic coastal hubs. Syrian officials say the deal is part of a wider push to modernize the country's logistics infrastructure. 'This strategic move will bolster our port operations and logistics services,' an unnamed Syrian official told SANA. Qutaiba Badawi, chairman of the General Authority for Land and Sea Ports, called the deal 'a new phase of field and maritime work in Syria.' DP World chairman Sultan Ahmed bin Sulayem said the agreement would position Tartous as a global transport node. 'Syria possesses valuable assets,' he said, adding, 'The port of Tartous will be one of the best in the world, particularly in transport and cargo handling services.' According to Badawi, the contract was the result of months of negotiations and was structured to be 'tight, fair and transparent.' The agreement includes infrastructure and technological upgrades to expand Tartous's cargo capacity and support the recovery of Syria's industrial and commercial sectors. The Tartous contract follows a series of high-value agreements signed in recent months, including a 30-year deal with France's CMA CGM to operate Latakia Port and a $7-billion energy contract with Qatari, Turkish, and US firms to restore the power grid. The US lifted most of its sanctions on Syria last month, citing what it called 'positive actions' by Sharaa's administration. US President Donald Trump has revoked the Foreign Terrorist Organization designation for the Nusra Front, later known as Hayat Tahrir al-Sham (HTS), according to a State Department memo filed on 7 July. In December 2024, HTS – under the leadership of Ahmad al-Sharaa (who went by the name Abu Mohammad al-Julani when he was still an ISIS chief) – successfully ousted former Syrian president Bashar al-Assad and took power in Damascus. On June 7, Syria was reinstated to the SWIFT banking system, as Damascus began implementing financial reforms under Central Bank Governor Abdul Qader al-Husriya. The Tartous Port deal comes seven months after HTS declared the ousting of the Assad government following its capture of Damascus and the flight of former president Bashar al-Assad.

Kaspersky highlights top risks of Quantum Computing
Kaspersky highlights top risks of Quantum Computing

Biz Bahrain

time2 days ago

  • Biz Bahrain

Kaspersky highlights top risks of Quantum Computing

Kaspersky is addressing one of the most debatable technological challenges of the coming decade: the rise of quantum computing and its potential impact on digital security. In this context, experts have identified the main quantum threats that demand immediate action from the cybersecurity community. As classical computers approach their physical limits, their performance growth is slowing — constraining progress in areas that depend on complex computation. At the same time, quantum computers, offering the potential to solve specific problems far faster than classical systems. For now, however, their practical use remains limited to narrow and experimental domains. Nevertheless, experts estimate that we may see a fully fault-tolerant quantum computer within the next decade — a development that could unlock significant advances, but also unleash a new era of cybersecurity threats. Supporting this urgency, Deloitte's 2024 Global Future of Cyber Survey reports that 83% of organizations are already assessing or taking steps to address quantum computing risks, demonstrating growing awareness and proactive strategies in the private sector. To better understand the scope of the evolving threat, Kaspersky has identified three of the most urgent quantum-related risks that demand action from the cybersecurity community: The top three risks Quantum computers could be used to compromise the traditional encryption methods that currently protect data in countless digital systems — posing a direct threat to global cybersecurity infrastructures. Threats include the interception and decoding of sensitive diplomatic, military, and financial communications, as well as the real-time decryption of private negotiations – something quantum systems could handle much faster than classical machines, turning secure conversations into open books. 1. Store now, decrypt later: the key threat of the coming years Threat actors are already harvesting encrypted data today, with the intention of decrypting it in the future once quantum capabilities advance. This 'store now, decrypt later' tactic could expose sensitive information years after it was originally transmitted — including diplomatic exchanges, financial transactions, and private communications. 2. Sabotage in blockchain and cryptocurrency Blockchain networks are not immune to quantum threats. Bitcoin's Elliptic Curve Digital Signature Algorithm (ECDSA), which relies on elliptic curve cryptography (ECC), is especially vulnerable. Potential risks include forging digital signatures, which threatens Bitcoin, Ethereum, and other cryptocurrencies; attacks on ECDSA that secure crypto wallets; and tampering with blockchain transaction history, undermining trust and integrity. 3. Quantum-resistant ransomware: a new front Looking ahead, developers and operators of advanced ransomware may begin adopting post-quantum cryptography to protect their own malicious payloads. So-called 'quantum-resistant' ransomware would be designed to resist decryption by both classical and quantum computers — potentially making recovery without paying a ransom nearly impossible. At present, quantum computing does not offer a way to decrypt files locked by current ransomware. Data protection and recovery still rely on traditional security solutions and collaboration among law enforcement agencies, quantum researchers, and international organizations. Building quantum-safe defenses Quantum computers are not yet a direct threat — but by the time they are, it may be too late to respond. Transitioning to post-quantum cryptography will take years. Preparations must begin today. The cybersecurity community, IT companies, and governments must coordinate to address the risks ahead. Policymakers should develop clear strategies to migrate to post-quantum algorithms. Businesses and researchers need to begin implementing new security standards now. 'The most critical risk lies not really in the future, but in the present: encrypted data with long-term value is already at risk from future decryption. The security decisions we make today will define the resilience of our digital infrastructure for decades. Governments, businesses, and infrastructure providers must begin adapting now, or risk systemic vulnerabilities that cannot be retroactively fixed', states Sergey Lozhkin, Head of Kaspersky Global Research & Analysis Team for META and APAC.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store