FunkSec Ransomware Decryptor Released, Victims Regain Files Free

Free Decryptor Released for FunkSec Ransomware After Group’s Demise

  • Security researchers have released a free decryptor tool for the FunkSec Ransomware.
  • The FunkSec group has targeted 172 organizations, mainly in the U.S., India, and Brazil.
  • The ransomware used Artificial Intelligence tools in its development.
  • FunkSec encrypted files using the Rust programming language and the orion-rs library with Chacha20 and Poly1305 algorithms.
  • The decryptor can be downloaded through the No More Ransom project, but users should back up files before proceeding.

Gen Digital researchers have published a decryptor for FunkSec ransomware, enabling victims to restore files without payment. The tool became available after experts determined that the ransomware group was no longer active.

- Advertisement -

According to Ransomware.live, FunkSec was responsible for 172 attacks since its emergence in late 2024. Entities in the United States, India, and Brazil were most affected, especially in technology, government, and education sectors. No new victims have appeared on FunkSec’s leak site since March 18, 2025.

Check Point’s January analysis suggested that FunkSec’s creators used artificial intelligence to help develop the ransomware’s encryption system. Researcher Ladislav Zezula of Gen Digital noted, “Because the ransomware is now considered dead, we released the decryptor for public download.” The group’s software encrypted files in 128-byte blocks and added 48 bytes of metadata, making locked files roughly 37% larger than originals.

Experts believe FunkSec’s operators were relatively inexperienced Hackers, seeking attention by posting datasets from previous hacktivist operations. The ransomware was built with Rust, a programming language known for its speed and efficiency. It used the orion-rs library (version 0.17.7) and cryptographic algorithms Chacha20 and Poly1305 to secure files.

Gen Digital did not explain whether the decryptor came from exploiting weaknesses in FunkSec’s cryptography. Users can access the tool via the No More Ransom project. Victims are advised to confirm that their files match FunkSec’s features—such as the .funksec extension or distinctive metadata—before using the decryptor.

- Advertisement -

Instructions at the No More Ransom portal guide victims through the process, but administrators should back up affected files first, as partial data recovery or file damage is possible.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Crypto Exchanges’ Key Security Threatened by Quantum Computing

Major crypto exchanges could lose the ability to safely generate new deposit addresses if...

AI Promises Productivity, Causes “Brain Fry”

A new study of U.S. workers found that 14% report "AI brain fry"—mental fatigue...

War Chaos Hits Markets: Dow Plummets, Oil Over $100

Dow futures plunged over 1,000 points Sunday night as oil surged past $100 a...

Aave Hits 155K User Record Despite Governance Turbulence

The DeFi lending protocol Aave achieved an all-time high of roughly 155,000 monthly active...

Stocks Plunge, Bitcoin Edges Higher as Oil Surges

Oil prices surged nearly 30%, marking their largest one-day gain since late 1988.Major Asian...

Must Read

Symbiosis Crypto Bridge: Your Guide to Moving Assets Between Blockchains

What is a Cross-Chain Crypto Bridge?Why Choose Symbiosis for Your Cross-Chain Needs?Support for 50+ BlockchainsAutomatic Routing for the Best RatesNo Need for RegistrationDirect Wallet...