Thursday, April 3, 2025
HomeArtificial IntelligenceFunkSec Ransomware Dominating Ransomware Attacks, Compromised 85 Victims In December

FunkSec Ransomware Dominating Ransomware Attacks, Compromised 85 Victims In December

Published on

SIEM as a Service

Follow Us on Google News

FunkSec is a RaaS operator that makes use of artificial intelligence and demonstrates how threat actor strategies are constantly evolving.

The analysis reveals that artificial intelligence has limited sophistication, even though it enables rapid operations scaling and the generation of ransomware. 

Claims that have been recycled or fabricated undermine credibility and suggest that there may be gaps in execution despite the innovative use of artificial intelligence.

FakeUpdates (SocGholish) was the most prevalent malware in December affected 5% of organizations around the world. While AgentTesla (3%), Androxgh0st (3%), and FakeUpdates (SocGholish) were the next most prevalent malware. 

In order to compromise organizations all over the world, these threats utilized a wide variety of methods, such as the theft of credentials and the attack of cross-platform botnets.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

FakeUpdates is a JavaScript downloader that installs malware like AgentTesla (a keylogger and information stealer), Androxgh0st (a multi-platform botnet targeting servers), Remcos (a remote access trojan exploiting Office documents), and AsyncRat (a Trojan collecting system information and executing commands) on compromised systems.

Trojans such as NJRat, Rilide, and Amadey have a wide range of capabilities that include the theft of data, remote access, and the distribution of malware for malicious purposes. 

A botnet known as Phorpiex is responsible for the dissemination of malware and the facilitation of spam campaigns. While Formbook is marketed as a MaaS, it is an information stealer that employs powerful evasion techniques. 

Anubis is a banking trojan with RAT, keylogging, and ransomware capabilities that topped mobile threats in December, followed by Necro, which is a trojan dropper, and Hydra is a banking trojan that steals credentials by exploiting banking app permissions.

Cyberattacks predominantly targeted Education/Research institutions, followed by Communications and Government/Military entities that highlight the heightened risk profile of sectors with complex, interconnected infrastructures and a wealth of sensitive data.

According to Check Point Research, FunkSec is an emerging group utilizing double extortion that led ransomware activity in December, followed by RansomHub, which is a RaaS known for targeting VMware ESXi and LeakeData, which is a newly identified entity operating a clear web DLS with unclear intentions. 

While persistent threats such as FakeUpdates, AgentTesla, and mobile malware continued to affect the threat landscape in December 2024, FunkSec utilized artificial intelligence in ransomware attacks. 

Critical infrastructure vulnerabilities and the rise of emerging groups underscore the need for organizations to proactively adapt with advanced technologies, real-time threat intelligence, and robust defense strategies to mitigate evolving cyber risks.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...

Qilin Operators Imitate ScreenConnect Login Page to Deploy Ransomware and Gain Admin Access

In a recent cyberattack attributed to the Qilin ransomware group, threat actors successfully compromised...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...