BERT ransomware group expands attacks across Asia and Europe

BERT ransomware group expands attacks across Asia and Europe

A cybercrime group known as BERT has begun targeting organizations across Asia, Europe, and the United States with ransomware attacks that affect both Windows and Linux platforms. Tracked by Trend Micro as ‘Water Pombero,’ BERT has already compromised multiple victims in sectors such as healthcare, technology, and event services since April.

BERT’s tactics include PowerShell-based loaders, privilege escalation techniques, and file encryption. One key tool is a PowerShell script (start.ps1), which disables system defenses, escalates privileges, and downloads the ransomware payload from a remote IP address registered in Russia. While the origin of the group is unclear, the use Russian infrastructure suggests possible links to regional affiliations.

The researchers have also spotted a Linux variant of BERT’s ransomware, which can spin up to 50 threads to accelerate file encryption and force shutdowns of ESXi virtual machines, crippling recovery processes. Trend Micro’s analysis suggests that the group’s ransomware may have been based on ransomware families like REvil and Babuk, known for targeting similar environments.

In terms of evolution, the new version of BERT's Windows variant begins encrypting files immediately as they are found, while the original version delayed encryption until files were fully mapped.

“New ransomware groups will likely continue to emerge, repurposing familiar tools and code, while refining TTPs. As the BERT ransomware group demonstrates, simple tools can lead to successful infections. This highlights how emerging groups do not need complex techniques to be effective—just a reliable path to their goal, from intrusion, exfiltration and ultimately leverage over victims,” the report concludes.

Back to the list

Latest Posts

Four arrested over cyberattacks targeting major UK retailers, including M&S

Four arrested over cyberattacks targeting major UK retailers, including M&S

The ransomware attack in April, forced Marks & Spencer to suspend online clothing sales for 46 days.
10 July 2025
Initial access broker exploits leaked machine keys to access targeted orgs

Initial access broker exploits leaked machine keys to access targeted orgs

The campaign exploits leaked Machine Keys used in ASP.NET applications.
10 July 2025
AI voice impersonator posed as US Secretary of State Marco Rubio to contact foreign ministers

AI voice impersonator posed as US Secretary of State Marco Rubio to contact foreign ministers

The impersonator contacted the targets in mid-June using the encrypted messaging app Signal.
9 July 2025