New ransomware group Funksec is quickly gaining traction

New ransomware group Funksec is quickly gaining traction New ransomware group Funksec is quickly gaining traction

The ransomware program attempts to gain elevated privileges using known techniques for PowerShell scripts, then proceeds to disable Windows Defender real-time protection service, security event logging on the system, and application event logging, remove restrictions placed on PowerShell execution, and finally delete volume shadow copies to prevent system restore.

The malware program then attempts to kill a long list of processes associated with a variety of programs, including browsers, video players, messaging applications, and Windows services. This ensures that access to potentially important files that will subsequently be encrypted is not locked by those applications.

Malware spreads across all drives and subdirectories

The ransomware will then iterate over all drive letters and recurse through all subdirectories, encrypting all files with a list of targeted extensions. The file encryption routine uses the ChaCha20 algorithm with ephemeral keys. Encrypted files have the .funksec extension attached to them.

Add a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Use