Free Decryptor Released for FunkSec Ransomware Victims
Cybersecurity experts have accomplished a significant breakthrough by releasing a free decryptor for victims of FunkSec ransomware. This development allows those affected to regain access to their locked files without paying any ransom.
About FunkSec Ransomware
FunkSec ransomware first appeared in late 2024, targeting a variety of sectors, including technology, government, and education. According to Ransomware.live, it has impacted a total of 172 victims, with the majority located in the United States, India, and Brazil.
Insights from Cybersecurity Analysts
Ladislav Zezula, a researcher at Gen Digital, confirmed that the decision to release the decryptor was based on the ransomware being deemed "dead." The lack of new victims reported since March 18, 2025, indicates that the FunkSec group may have ceased operations.
An analysis conducted by Check Point in January 2025 pointed to the use of artificial intelligence tools in developing FunkSec’s encryptor. This insight suggests a new trend among cybercriminals leveraging advanced technologies to enhance their attacks.
The Profile of the FunkSec Group
Interestingly, FunkSec appears to have been operated by less experienced hackers who sought visibility in the cyber world. The group became known for uploading leaked datasets linked to prior hacktivism campaigns. This ambition for notoriety may have contributed to their eventual downfall and inactivity.
Technical Aspects of the Ransomware
Built using the Rust programming language, FunkSec aligns with the growing preference among newer ransomware groups for technologies that provide quick and efficient attacks. Other notorious families, such as BlackCat and Agenda, also employ Rust for similar reasons.
FunkSec harnesses the orion-rs library (version 0.17.7) to execute its encryption processes. It utilizes the Chacha20 and Poly1305 algorithms, which help lock files during an attack, enhancing both speed and evasion of detection.
Encryption Methodology
Zezula explained that FunkSec employs a hash-based method to ensure the integrity of various encryption parameters, such as the encryption key, nonces, block lengths, and the encrypted data itself. Files are encrypted in manageable blocks of 128 bytes, with an additional 48 bytes of metadata added to each block. As a result, encrypted files end up being approximately 37% larger than their original versions.
Availability of the Decryptor
Gen Digital has not disclosed the specific techniques used to develop this decryptor, raising questions about whether it exploits a fundamental cryptographic weakness. However, victims can obtain the decryptor through the No More Ransom initiative, designed to assist those affected by ransomware.
Steps for Victims to Recover Their Files
For individuals looking to restore their data, it’s essential first to verify that the encrypted files bear FunkSec’s signature. Typically, these files will have the .funksec extension or unique metadata padding. The No More Ransom portal offers basic steps for using the decryptor, though administrators should be cautious. It’s advisable for them to back up affected files prior to decryption attempts to safeguard against potential partial recovery or file corruption issues.
This latest development marks a crucial step in the ongoing battle against ransomware and highlights the importance of cybersecurity measures in protecting sensitive data.


