Illustration: JMiks | Shutterstock
Security researchers have discovered a novel ransomware group called BERT targeting organisations across Asia, Europe, and the US. The group targets both Windows and Linux machines and already has confirmed victims across industry sectors, including healthcare, tech, and event services companies.
BERT was first observed by Trend Micro researchers in April 2025 targeting organisations across the US and parts of Asia. Since then, the group has expanded its activity to Europe and more countries within Asia. Trend Micro’s report claims that multiple samples were found during the investigation, suggesting the malware developers are actively developing and improving their ransomware.

Not much is known about the group at the time of writing. Analysis of a sample caught in the wild revealed that the ransomware is executed from a remote IP address that is associated with ASN 39134, registered in Russia. However, this alone isn’t enough evidence to establish attribution, as the use of Russian infrastructure can simply mean a connection to threat actors located in or operating within the region.
BERT uses a simple codebase, with tactics including PowerShell-based loaders, privilege escalation, and concurrent file encryption. A loader for the ransomware elevates privileges, and disables Windows Defender, the firewall, and User Account Control (UAC), before downloading and executing the ransomware from the aforementioned remote IP address. Linux variants work differently but maintain a simple approach using up to 50 threads for faster encryption and can even force shutdown ESXi virtual machines to disrupt recovery.

The ransom note is also not hidden in the code. There are no ominous warnings, just a claim that your network is hacked, files are encrypted, and some “important files” have been downloaded. After this, the note provides an ID for contacting the BERT team over an encrypted messenger where the ransomware negotiation takes place, if any.
In the News: COD WWII hacked; PC version taken offline
