BERT RANSOMWARE - THE RAVEN FILE
BERT Ransomware, active since March 2025, has expanded its operations to target both Windows and Linux environments. The group uses phishing for initial access and communicates via the dark web and Sessions for negotiations. Victims span multiple countries, primarily affecting service and manufacturing sectors. The Windows variant employs multiple file extensions and RSA encryption, while the Linux version shares code with Sodinokibi/REvil ransomware. A weaponized PowerShell script is used to disable security features before payload execution. The ransomware's infrastructure is linked to a Russian firm, suggesting potential ties to the region.
Pulse ID: 6855b5c6da6f1326c8888a58
Pulse Link: https://otx.alienvault.com/pulse/6855b5c6da6f1326c8888a58
Pulse Author: AlienVault
Created: 2025-06-20 19:25:58
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #Encryption #InfoSec #Linux #Manufacturing #OTX #OpenThreatExchange #Phishing #PowerShell #RAT #REvil #RansomWare #Russia #Windows #bot #AlienVault