Threat intelligence

Funksec Ransomware Teams Up with Another Ransomware Group to Double Down on Targets

by Security News

FunkSec is a relatively new but highly active ransomware group that, as of this writing, has targeted several dozen victims across industries like government, banking, communications, and education. In a recent blog post, the group announced a partnership with another ransomware outfit, FSociety, aiming to carry out attacks more efficiently.

This week, SonicWall Capture Labs research team analyzed the group's malware, known as FunkLocker ransomware. Interestingly, rather than demanding massive payouts, FunkSec typically requests just 0.1 Bitcoin. This suggests they may be pursuing a "churn and burn" strategy — favoring a quick turnover approach to rapidly generate revenue.

Infection Cycle

Upon execution, it spawns legitimate Windows processes to do system reconnaissance.

Fig_1._Spawn_legit_processes.png

Figure 1: Legitimate Windows processes are spawned upon execution of malware

It uses PowerShell to check for certain system policies in the Windows registry such as internet settings, installed system certificates, current control set code integrity settings, etc.

Fig_2._powershell.png

Figure 2: Powershell.exe is used to check various system registry settings

Fig_3._disable_CI.png

Figure 3: Disabling Current Control Set CI or Code integrity allows applications that might not meet security standards to run on the system.

It also tries to disable certain services using sc.exe.

Fig_4._disable_services.png

Figure 4: Command line window that shows certain services being disabled

It will then encrypt target files, add the “.funksec”  file extension and then reboot the system.

Fig_5._funksec_file_ext.png

Figure 5: Encrypted files with .funksec file extension

Upon reboot, the victim can find a ransom note on the desktop that asks for roughly the equivalent of $10,000 in Bitcoin in exchange for decrypting the files.

Fig_6._ransomnote.png

Figure 6: Ransom note on the victim’s machine

On the Funksec TOR website, it displays all of its alleged victims which span across different industries

Fig_7._victims.png

Figure 7: Funksec TOR website displaying high-profile victims

Funksec's website also features a marketplace where other cybercriminal groups can sell data, which may not necessarily be data stolen by Funksec.

Fig_8._marketplace.png

Figure 8: Funksec hosted marketplace for cybercriminals

Its forum site is very active and has recently announced its partnership with another ransomware group.

fig_9._partnership.png

Figure 9: Funksec announces partnership with FSociety

One of the latest threads created shows an example of how this cybercriminal group has been in correspondence with another alleged victim. The operators emphasize the low ransom payment and that they are not interested in negotiation.

Fig_10._Correspondence.png

Figure 10: Correspondence with an alleged victim

SonicWall Capture Labs provides protection against this threat via the following signature:

  • GAV:Funklocker.RSM (Trojan)

This threat is also detected by SonicWall Capture ATP w/RTDMI and the Capture Client endpoint solutions.

Share This Article

An Article By

Security News

The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.

Related Articles

  • Critical OS Command Injection in Appium Desktop Zero-Click RCE
    Read More
  • Windows LDAP Denial of Service Vulnerability (CVE-2024-49113): Crucial Information and How to Stay Protected
    Read More