Monday, January 20, 2025
HomeArtificial IntelligenceFunkSec Ransomware Dominating Ransomware Attacks, Compromised 85 Victims In December

FunkSec Ransomware Dominating Ransomware Attacks, Compromised 85 Victims In December

Published on

SIEM as a Service

Follow Us on Google News

FunkSec is a RaaS operator that makes use of artificial intelligence and demonstrates how threat actor strategies are constantly evolving.

The analysis reveals that artificial intelligence has limited sophistication, even though it enables rapid operations scaling and the generation of ransomware. 

Claims that have been recycled or fabricated undermine credibility and suggest that there may be gaps in execution despite the innovative use of artificial intelligence.

FakeUpdates (SocGholish) was the most prevalent malware in December affected 5% of organizations around the world. While AgentTesla (3%), Androxgh0st (3%), and FakeUpdates (SocGholish) were the next most prevalent malware. 

In order to compromise organizations all over the world, these threats utilized a wide variety of methods, such as the theft of credentials and the attack of cross-platform botnets.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

FakeUpdates is a JavaScript downloader that installs malware like AgentTesla (a keylogger and information stealer), Androxgh0st (a multi-platform botnet targeting servers), Remcos (a remote access trojan exploiting Office documents), and AsyncRat (a Trojan collecting system information and executing commands) on compromised systems.

Trojans such as NJRat, Rilide, and Amadey have a wide range of capabilities that include the theft of data, remote access, and the distribution of malware for malicious purposes. 

A botnet known as Phorpiex is responsible for the dissemination of malware and the facilitation of spam campaigns. While Formbook is marketed as a MaaS, it is an information stealer that employs powerful evasion techniques. 

Anubis is a banking trojan with RAT, keylogging, and ransomware capabilities that topped mobile threats in December, followed by Necro, which is a trojan dropper, and Hydra is a banking trojan that steals credentials by exploiting banking app permissions.

Cyberattacks predominantly targeted Education/Research institutions, followed by Communications and Government/Military entities that highlight the heightened risk profile of sectors with complex, interconnected infrastructures and a wealth of sensitive data.

According to Check Point Research, FunkSec is an emerging group utilizing double extortion that led ransomware activity in December, followed by RansomHub, which is a RaaS known for targeting VMware ESXi and LeakeData, which is a newly identified entity operating a clear web DLS with unclear intentions. 

While persistent threats such as FakeUpdates, AgentTesla, and mobile malware continued to affect the threat landscape in December 2024, FunkSec utilized artificial intelligence in ransomware attacks. 

Critical infrastructure vulnerabilities and the rise of emerging groups underscore the need for organizations to proactively adapt with advanced technologies, real-time threat intelligence, and robust defense strategies to mitigate evolving cyber risks.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Multiple Azure DevOps Vulnerabilities Let Inject CRLF Queries & Rebind DNS

Researchers uncovered several significant vulnerabilities within Azure DevOps, specifically focusing on potential Server-Side Request...

Hackers Weaponize npm Packages To Steal Solana Private Keys Via Gmail

Socket’s threat research team has identified a series of malicious npm packages specifically designed...

Hackers Weaponize MSI Packages & PNG Files to Deliver Multi-stage Malware

Researchers have reported a series of sophisticated cyber attacks aimed at organizations in Chinese-speaking...

New IoT Botnet Launching Large-Scale DDoS attacks Hijacking IoT Devices

Large-scale DDoS attack commands sent from an IoT botnet's C&C server targeting Japan and...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Multiple Azure DevOps Vulnerabilities Let Inject CRLF Queries & Rebind DNS

Researchers uncovered several significant vulnerabilities within Azure DevOps, specifically focusing on potential Server-Side Request...

Hackers Weaponize npm Packages To Steal Solana Private Keys Via Gmail

Socket’s threat research team has identified a series of malicious npm packages specifically designed...

Hackers Weaponize MSI Packages & PNG Files to Deliver Multi-stage Malware

Researchers have reported a series of sophisticated cyber attacks aimed at organizations in Chinese-speaking...