Malware & RansomwareHIGH

Malware - Bearlyfy Targets 70+ Russian Firms with Ransomware

THThe Hacker News
GenieLockerBearlyfyransomwareWindowscyber attacks
🎯

Basically, a hacker group is attacking Russian companies with a new type of ransomware called GenieLocker.

Quick Summary

Bearlyfy has struck over 70 Russian firms with its custom GenieLocker ransomware. This group aims for financial gain and sabotage, significantly impacting businesses. Organizations must enhance their defenses to combat this growing threat.

What Happened

Bearlyfy, a pro-Ukrainian hacking group, has been making headlines since January 2025. This group has executed more than 70 cyber attacks against Russian companies, employing a custom ransomware known as GenieLocker. The group aims to inflict maximum damage, blending financial extortion with acts of sabotage. Their recent activities have escalated, with ransom demands reaching as high as €80,000 (approximately $92,100).

Initially documented by Russian security vendor F6 in September 2025, Bearlyfy has evolved from targeting smaller firms to major enterprises. Their tactics have shifted towards using a proprietary ransomware family, GenieLocker, which began targeting Windows endpoints in March 2026. This evolution highlights the group's increasing sophistication and ambition.

Who's Being Targeted

Bearlyfy's targets primarily include Russian businesses, which have become the focus of their cyber warfare. The group has been particularly aggressive, using rapid-fire attacks that require minimal preparation. This approach allows them to quickly encrypt data and demand ransoms without generating automated ransom notes. Instead, they communicate directly with victims, applying psychological pressure to encourage payment.

The group’s operations suggest a strategic approach to inflicting economic harm on Russian companies, aligning with their pro-Ukrainian stance. As they gain notoriety, the potential for further attacks increases, raising alarms among cybersecurity experts.

Signs of Infection

Victims of Bearlyfy's attacks often experience sudden data encryption and ransom demands. The GenieLocker ransomware is designed to encrypt files on infected Windows systems, rendering them inaccessible. Early signs of infection may include:

  • Unusual system slowdowns
  • Inability to access certain files or folders
  • Notifications or messages demanding ransom payments

Organizations should be vigilant, as the group exploits vulnerable applications and external services to gain initial access. The use of tools like MeshAgent for remote access further complicates detection and response efforts.

How to Protect Yourself

To safeguard against Bearlyfy and similar ransomware threats, organizations should adopt a multi-layered security strategy. Here are some recommended actions:

  • Regularly update software to patch vulnerabilities.
  • Implement robust backup solutions to ensure data recovery without paying ransoms.
  • Educate employees about phishing and other social engineering tactics.
  • Monitor network traffic for unusual activity that could indicate a breach.

By taking proactive measures, businesses can enhance their resilience against ransomware attacks and reduce the likelihood of falling victim to groups like Bearlyfy. As the threat landscape evolves, staying informed and prepared is essential for effective cybersecurity.

🔒 Pro insight: Bearlyfy's rapid evolution in tactics signals a need for heightened vigilance among organizations facing ransomware threats, especially in politically charged environments.

Original article from

The Hacker News

Read Full Article

Related Pings

HIGHMalware & Ransomware

Malware - Hackers Target South Asian Financial Firm with BRUSHWORM

A South Asian financial firm was hit by a targeted cyberattack using BRUSHWORM and BRUSHLOGGER malware. This attack highlights the growing risk to financial institutions. Security teams are urged to implement strict measures to protect sensitive data and prevent further breaches.

Cyber Security News·
HIGHMalware & Ransomware

Malware - Bogus Avast Website Installs Venom Stealer

A fake Avast site tricks users into downloading malware. This malware, Venom Stealer, targets passwords and crypto wallets. Quick action is needed to protect sensitive information.

Malwarebytes Labs·
HIGHMalware & Ransomware

Malware - Hackers Deploy PXA Stealer via Phishing ZIP Files

Cybercriminals are ramping up attacks on financial firms using PXA Stealer malware. This sophisticated threat follows the dismantling of major infostealer operations, increasing risks for sensitive data. Organizations must enhance their defenses to combat this growing menace.

Cyber Security News·
HIGHMalware & Ransomware

Infiniti Stealer - New Malware Targets macOS Users via CAPTCHA

A new malware called Infiniti Stealer is targeting macOS users through fake Cloudflare CAPTCHA pages. This clever trick bypasses traditional security measures, posing serious risks. Users are urged to take immediate action to protect their sensitive data.

Cyber Security News·
HIGHMalware & Ransomware

ClickFix Attack - New Malware Technique Uncovered

The ClickFix attack technique is tricking users into running harmful commands on their devices. This method affects Windows and macOS users, posing a significant risk to various industries. Awareness and proactive measures are crucial to prevent these types of malware infections.

Cyber Security News·
HIGHMalware & Ransomware

Coruna Exploit - Evolution of Triangulation iOS Framework

Kaspersky has discovered the Coruna exploit kit, which reuses code from the Operation Triangulation attacks. This poses a significant risk to iOS users. With millions of devices vulnerable, timely updates are crucial to protect sensitive data.

Security Affairs·