FunkSec Ransomware Decryptor Released, Victims Regain Files Free

Free Decryptor Released for FunkSec Ransomware After Group’s Demise

  • Security researchers have released a free decryptor tool for the FunkSec Ransomware.
  • The FunkSec group has targeted 172 organizations, mainly in the U.S., India, and Brazil.
  • The ransomware used Artificial Intelligence tools in its development.
  • FunkSec encrypted files using the Rust programming language and the orion-rs library with Chacha20 and Poly1305 algorithms.
  • The decryptor can be downloaded through the No More Ransom project, but users should back up files before proceeding.

Gen Digital researchers have published a decryptor for FunkSec ransomware, enabling victims to restore files without payment. The tool became available after experts determined that the ransomware group was no longer active.

- Advertisement -

According to Ransomware.live, FunkSec was responsible for 172 attacks since its emergence in late 2024. Entities in the United States, India, and Brazil were most affected, especially in technology, government, and education sectors. No new victims have appeared on FunkSec’s leak site since March 18, 2025.

Check Point’s January analysis suggested that FunkSec’s creators used artificial intelligence to help develop the ransomware’s encryption system. Researcher Ladislav Zezula of Gen Digital noted, “Because the ransomware is now considered dead, we released the decryptor for public download.” The group’s software encrypted files in 128-byte blocks and added 48 bytes of metadata, making locked files roughly 37% larger than originals.

Experts believe FunkSec’s operators were relatively inexperienced Hackers, seeking attention by posting datasets from previous hacktivist operations. The ransomware was built with Rust, a programming language known for its speed and efficiency. It used the orion-rs library (version 0.17.7) and cryptographic algorithms Chacha20 and Poly1305 to secure files.

Gen Digital did not explain whether the decryptor came from exploiting weaknesses in FunkSec’s cryptography. Users can access the tool via the No More Ransom project. Victims are advised to confirm that their files match FunkSec’s features—such as the .funksec extension or distinctive metadata—before using the decryptor.

- Advertisement -

Instructions at the No More Ransom portal guide victims through the process, but administrators should back up affected files first, as partial data recovery or file damage is possible.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Microsoft to Invest $50 Billion in AI Across Global South

Microsoft announced a massive $50 billion investment in AI infrastructure across the Global South.The...

OpenAI, Paradigm Launch AI for Smart Contract Security

OpenAI and Paradigm released EVMbench, a benchmark for AI agents that find and fix...

Deposit Token Race Heats Up, Germany Nears Launch

Germany's CBMT deposit token initiative is advancing to production, with a live Sandbox and...

CME to Offer 24/7 Crypto Futures Trading From 2026

CME Group will launch 24/7 trading for regulated crypto derivatives starting May 29, 2026.Trading...

Voltage Launches ‘Send Now, Pay Later’ Bitcoin Credit Line

Voltage launched a revolving line of credit allowing instant Lightning payments with USD or...

Must Read

This is How to Buy and Sell Bitcoin

Now more than ever, there are a variety of ways to enter and exit the crypto market. While this is good, the availability of...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!