Regions Targeted: Asia, Europe, United States
Related Families: REvil, Babuk
Key Takeaways
What is BERT?
BERT’s Windows variant employs straightforward code, terminating processes linked to web servers and databases before encrypting files with AES algorithms. It appends the “.encryptedbybert” extension and drops a ransom note. Older variants enumerated drives and collected file paths before encryption, while newer iterations utilize ConcurrentQueue and DiskWorker threads for immediate, multi-threaded encryption, enhancing efficiency. The Linux variant, observed in May 2025, targets ESXi servers, using 50 threads to rapidly encrypt files and appending the “.encrypted_by_bert” extension. It supports command-line parameters for targeted directories and thread counts, and forcibly terminates virtual machines to maximize disruption.
The ransomware’s configuration, embedded in JSON, includes public keys and ransom note details, a hallmark of modern ransomware adaptability. Trend Micro notes similarities between BERT’s Linux variant and REvil’s ESXi-targeting code from 2021, with additional overlap from Babuk’s leaked source. This suggests BERT’s developers are repurposing established ransomware frameworks, refining them for broader impact. The group’s phishing-driven initial access, though not fully detailed, likely exploits social engineering to deploy malicious attachments.
Victims face significant operational and financial risks, with healthcare and technology sectors particularly vulnerable due to their reliance on digital infrastructure. BERT’s rapid evolution and code reuse underscore the persistent threat of ransomware groups leveraging simple yet effective tactics. PolySwarm analysts consider BERT to be an emerging and evolving threat.
IOCs
PolySwarm has multiple samples associated with this activity.
1ef6c1a4dfdc39b63bfe650ca81ab89510de6c0d3d7c608ac5be80033e559326
70211a3f90376bbc61f49c22a63075d1d4ddd53f0aefa976216c46e6ba39a9f4
8478d5f5a33850457abc89a99718fc871b80a8fb0f5b509ac1102f441189a311
b2f601ca68551c0669631fd5427e6992926ce164f8b3a25ae969c7f6c6ce8e4f
bd2c2cf0631d881ed382817afcce2b093f4e412ffb170a719e2762f250abfea4
c7efe9b84b8f48b71248d40143e759e6fc9c6b7177224eb69e0816cc2db393db
You can use the following CLI command to search for all BERT samples in our portal:
$ polyswarm link list -f BERT
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or subscribe.
Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports.