Cyber Security News

FunkSec Ransomware Dominating Ransomware Attacks, Compromised 85 Victims In December

FunkSec is a RaaS operator that makes use of artificial intelligence and demonstrates how threat actor strategies are constantly evolving.

The analysis reveals that artificial intelligence has limited sophistication, even though it enables rapid operations scaling and the generation of ransomware. 

Claims that have been recycled or fabricated undermine credibility and suggest that there may be gaps in execution despite the innovative use of artificial intelligence.

FakeUpdates (SocGholish) was the most prevalent malware in December affected 5% of organizations around the world. While AgentTesla (3%), Androxgh0st (3%), and FakeUpdates (SocGholish) were the next most prevalent malware. 

In order to compromise organizations all over the world, these threats utilized a wide variety of methods, such as the theft of credentials and the attack of cross-platform botnets.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

FakeUpdates is a JavaScript downloader that installs malware like AgentTesla (a keylogger and information stealer), Androxgh0st (a multi-platform botnet targeting servers), Remcos (a remote access trojan exploiting Office documents), and AsyncRat (a Trojan collecting system information and executing commands) on compromised systems.

Trojans such as NJRat, Rilide, and Amadey have a wide range of capabilities that include the theft of data, remote access, and the distribution of malware for malicious purposes. 

A botnet known as Phorpiex is responsible for the dissemination of malware and the facilitation of spam campaigns. While Formbook is marketed as a MaaS, it is an information stealer that employs powerful evasion techniques. 

Anubis is a banking trojan with RAT, keylogging, and ransomware capabilities that topped mobile threats in December, followed by Necro, which is a trojan dropper, and Hydra is a banking trojan that steals credentials by exploiting banking app permissions.

Cyberattacks predominantly targeted Education/Research institutions, followed by Communications and Government/Military entities that highlight the heightened risk profile of sectors with complex, interconnected infrastructures and a wealth of sensitive data.

According to Check Point Research, FunkSec is an emerging group utilizing double extortion that led ransomware activity in December, followed by RansomHub, which is a RaaS known for targeting VMware ESXi and LeakeData, which is a newly identified entity operating a clear web DLS with unclear intentions. 

While persistent threats such as FakeUpdates, AgentTesla, and mobile malware continued to affect the threat landscape in December 2024, FunkSec utilized artificial intelligence in ransomware attacks. 

Critical infrastructure vulnerabilities and the rise of emerging groups underscore the need for organizations to proactively adapt with advanced technologies, real-time threat intelligence, and robust defense strategies to mitigate evolving cyber risks.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance

Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces its…

7 hours ago

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券), a…

7 hours ago

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series of…

7 hours ago

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive ransomware,…

7 hours ago

Qilin Operators Imitate ScreenConnect Login Page to Deploy Ransomware and Gain Admin Access

In a recent cyberattack attributed to the Qilin ransomware group, threat actors successfully compromised a…

7 hours ago

Operation HollowQuill Uses Malicious PDFs to Target Academic and Government Networks

A newly uncovered cyber-espionage campaign, dubbed Operation HollowQuill, has been identified as targeting academic, governmental,…

7 hours ago