FunkSec

The Fragile Face of AI-Generated Ransomware

By Riyad Jazmawi

Head of Information Security and IT Governance, INVESTBANK

FunkSec emerged in late 2024 as a fast-moving Ransomware-as-a-Service (RaaS) family that quickly drew attention for its combination of modern tooling and obvious implementation weaknesses. FunkSec is a Rust-based ransomware, meaning it is developed using Rust instead of traditional languages like C and C++. The ransomware employs a double-extortion approach, encrypting victims’ files while exfiltrating data for public shaming. The family demonstrated how new development workflows (including the use of generative AI to write large portions of code) can accelerate an actor’s reach while also introducing mistakes. The result is a strain that is capable and dangerous in the hands of affiliates, yet flawed enough that defenders have repeatedly found practical openings for detection and recovery.

A recurring theme in public analyses is FunkSec’s reliance on AI-assisted code generation. Using large language models enabled affiliates with limited programming experience to quickly produce ransomware, but LLMs tend to generate plausible-looking code without guaranteeing robust error management. This lack of rigorous testing is evident across FunkSec builds, manifesting as logical assumptions and fragile control flows that fail under real-world conditions. Rather than mature, well-engineered malware, many FunkSec samples resemble a rapid prototype: functional, but fragile.

One clear manifestation of these problems is FunkSec’s drive enumeration logic. Several samples treat every mounted volume as if it were removable media, copying themselves to each detected drive and failing to differentiate between fixed system disks, network shares, and actual USB devices. This misuse of drive semantics leads to inefficient scanning and, in some cases, skipped targets; it also produces unusual API usage patterns that defenders can monitor. Proper use of standard OS calls (for example, querying drive type using the Windows API GetDriveType) would have avoided these mistakes, but the AI-generated code often overlooked these capabilities.

Another operational mistake that surfaced in multiple reports is a dependency on downloading and setting a ransom wallpaper. Many FunkSec variants attempt to fetch an image from a remote server and apply it as the desktop background. If the download fails due to network filtering, a dead URL, or an HTTP error, the encryption routine can crash instead of continuing. Tying a core destructive action to a cosmetic operation is poor logic. It has given defenders a straightforward mitigation: blocking the wallpaper URL or otherwise disrupting an auxiliary step can sometimes prevent encryption from completing.

The ransomware has revealed another vulnerability due to the reuse of default artifacts. Analysts observed connections in some builds to local IP addresses on port 4444, the default Metasploit port for a reverse shell.  Seeing traffic to 4444 is a classic indicator of a Metasploit-derived payload, suggesting the reuse of common templates and a lack of operational sophistication in choosing stealthier or customized communication channels. Whether present in all samples or only some, the presence of such defaults is an operational weakness.

Cryptographic implementation is where FunkSec demonstrates both modern choices and significant mistakes. Many variants use ChaCha20-Poly1305 (and some analysts report XChaCha20 in some variants) implemented via Rust crypto libraries, which, in principle, are strong primitives. However, poor key and nonce handling in certain builds, combined with inconsistent design decisions across variants, undermined the intended security. For example, in some cases, the malware stores the nonces or even key material directly into each encrypted file in ways that made recovery easy for researchers. Rather than properly wrapping cryptographic material in a protected header (for example, encrypting it with an RSA key), flawed implementations enabled security vendors to produce working decryptors.

FunkSec’s process and service termination routines further illustrate the trade-offs of automated coding. The binary typically contains a hardcoded list of processes and services to stop, such as browsers, mail clients, backup tools, and security services, intended to free file handles and disable protections. While this is a common ransomware tactic, FunkSec’s lists are overbroad and sometimes redundant. The noisy, large-scale termination behavior creates high-confidence detection signals (i.e., mass process kills followed by bulk file I/O).

Taken together, these flaws paint a consistent picture: GenAI enabled rapid development and wide dissemination of FunkSec, but they also introduced fragile logic, improper error handling within the malware workflow, and insecure cryptographic practices. For the security team, the very mistakes FunkSec exhibits – failed wallpaper downloads, drive misclassification, default C2 ports, recoverable key material, and mass process termination – are practical signals that incident responders can use for detecting, preventing, and containing AI-powered malware.

The broader takeaway is that while GenAI may accelerate the speed with which ransomware families like FunkSec spread, it does not necessarily translate into greater sophistication. Training security analysts to spot these GenAI coding indicators not only helps identify FunkSec variants but also prepares security teams for the next wave of AI-assisted malware, which will likely share the same strengths and weaknesses.

Read Also

ITSCT CBJ Openning
Cybersecurity Bootcamp 2025 with the Central Bank of Jordan
IT Security C&T Job Fair 2025 4
IT Security C&T Job Fair 2025
Cybersecurity & Compliance_ITSCT
Cybersecurity & Compliance: What to Expect in 2025
Digital Transformation & Cybersecurity_ITSCT
Digital Transformation & Cybersecurity: Finding the Balance
2152001151
PDPL Compliance: Turning Regulation into Opportunity
ITSCT_ISACA_CISM321324
IT Security C&T Collaborates with the Central Bank of Jordan in Cybersecurity Bootcamp 2025
ITSCTTrainingProgram 1
Cybersecurity Training Program Successfully Completed
ITSCT_vCISO AD 1-100
Top 5 vCISO Benefits for Your Organization
ITSCT_training4613-100
IT Security C&T Welcomes University Students to Internship Program
IT_SecurityC&T_atneshi-100
IT Security C&T Expands Collaboration with Andersen Consulting
IT_Security_Training_2202566546
Completion of CIHE Training with Central Bank of Jordan
IT_Security_Training_22025
IT Security C&T Partners with SOC-CMM to Drive SOC Excellence
Option B copy@2x-100
Top 5 Cybersecurity Tips for Small Businesses in 2025
IT_Security_CyberSummet20243@0
Participating & Sponsoring the DOTCyberSUMMIT2024
1714047861403
IT Security C&T Sponsors CTF for Schools
1714668998818
IT Security C&T's Attendance at GISEC Global in Dubai
f39a0cac-8ef4-4272-8576-531e56fb3b40
Economic Forum Organized by Iraqi Business Council
1708615205871
the opening of the fourth cohort of the "معسكر نشامى السايبر"
IT_Security_CT_Cybersummit_23
Part of DOT Cyber Summit
8c04bdb2-eaa8-4281-9c5f-f81d02ba182f
The Path to Cyber Security Workshop
menaict2022 1
MENA ICT Forum 2022
70244f6f-7b2c-4925-91dc-80319aeaafaf
ISACA’s Amman Chapter Annual Conference 2022
Muntaser & Ammar copy
Technical Partner Of The Year 2021 award
Facebook Post – 2
IT Security C&T Signed Partnership with TrinitySoft
Artboard 1 copy@2x-100
Ambassador Partnership with Vectra AI
Facebook Post – 1
Staying Ahead of Breaches in 2022