Threat Advisories:
🎧 Hive Force Labs: October First Threat Research
👥 Play Count: Loading...

FunkLocker: Emerging AI-Assisted Ransomware

Amber | Attack Report
Download PDF

FunkLocker: Emerging AI-Assisted Ransomware

Summary

First identified in December 2024, FunkLocker ransomware is an AI-assisted threat developed by the FunkSec Group, operating under a Ransomware-as-a-Service (RaaS) model. Targeting Windows systems, the group has struck across multiple industries including government, defense, finance, and higher education, with victims reported in the United States, India, Spain, Mongolia, Italy, Brazil, and Israel.

FunkLocker encrypts files locally using RSA-2048 and AES-256 encryption, appending the “.funksec” extension to compromised data. Unlike many ransomware families, FunkLocker operates without command-and-control communication, relying solely on local encryption and demanding low ransoms (around 0.1 Bitcoin) to encourage fast payments. The FunkSec Group’s blend of cybercrime and hacktivism underscores the shift toward AI-enabled ransomware that prioritizes speed, stealth, and scalability.

Attack Details

FunkSec Group designed FunkLocker to execute attacks directly on victim machines without network dependencies. Once deployed, the ransomware terminates critical processes, disables antivirus and security tools, and prevents system recovery by misusing legitimate Windows utilities such as taskkill.exe, sc.exe, and PowerShell. This allows the ransomware’s activities to blend seamlessly with normal system operations.

After neutralizing defenses, FunkLocker encrypts all accessible files, appending the “.funksec” extension. Its offline encryption model makes detection through traditional network-based monitoring tools nearly impossible.

Researchers have determined that FunkLocker’s codebase is partially generated using artificial intelligence, enabling rapid creation of new variants but also introducing weaknesses such as hardcoded encryption keys and reused cryptocurrency wallets. These flaws have allowed some free decryption tools to emerge, though many organizations remain vulnerable.

To date, over 120 organizations have been impacted. The campaign shows an opportunistic pattern—targeting both public and private sectors—demonstrating how AI-driven malware automation is accelerating the pace and unpredictability of ransomware operations.

Recommendations

  • Preventive Security Controls: Deploy application whitelisting to block unauthorized executables, especially Windows utilities abused by FunkLocker (PowerShell, taskkill.exe, sc.exe). Keep endpoints patched and secured with advanced EDR and NGAV solutions.

  • Network Segmentation & Access Control: Restrict administrative privileges and enforce least-privilege policies to prevent lateral movement.

  • Strong Access Management: Limit access to critical systems and sensitive files. Ensure privileged accounts are protected by MFA.

  • Regular Data Backups: Conduct frequent, offline backups of essential systems. Test restoration processes regularly to ensure operational resilience in the event of ransomware infection.

  • Proactive Monitoring: Hunt for indicators such as system service termination, PowerShell misuse, or attempts to disable security softwares.

Indicators of Compromise (IoCs)

SHA256 Hashes

  • c233aec7917cf34294c19dd60ff79a6e0fac5ed6f0cb57af98013c08201a7a1c

  • e29d95bfb815be80075f0f8bef4fa690abcc461e31a7b3b73106bfcd5cd79033

File Path

  • C:\Users\admin\Desktop\README-ZasRvdSR44.md

Recent Breaches

MITRE ATT&CK TTPs

  • TA0001 Initial Access

  • TA0002 ExecutionT1059, T1059.001 (PowerShell)

  • TA0003 Persistence

  • TA0005 Defense EvasionT1036, T1036.005 (Masquerading), T1562, T1562.001 (Disable or Modify Tools)

  • TA0007 DiscoveryT1007 (System Service Discovery), T1135 (Network Share Discovery)

  • TA0040 ImpactT1486 (Data Encrypted for Impact), T1489 (Service Stop), T1490 (Inhibit System Recovery), T1498 (Network Denial of Service)

  • TA0042 Resource DevelopmentT1587 (Develop Capabilities), T1588.007 (Artificial Intelligence)

References

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox

Cybersecurity Leaders Dinner In Houston

Learn how to reduce your exposure to imminent risk & Network with Industry Peers

Hosted by former CISO, Al Lindseth and Threat Exposure Evangelist, Critt Golden.

Tuesday, October 7th, 2025
6.00 pm to 9.00 pm
Del Friscos Double Eagle Steakhouse, Houston TX