Description
BERT ransomware (also tracked as Water Pombero) first emerged in April 2025, rapidly targeting both Windows and Linux systems across Asia, Europe, and the U.S., with confirmed victims in healthcare, technology, electronics, and event services sectors. Its Windows variant employs a PowerShell-based loader that escalates privileges, disables Defender, UAC, and the firewall, then downloads the ransomware payload. The Linux version aggressively encrypts with up to 50 concurrent threads, forcibly shuts down VMware ESXi VMs to prevent recovery, and appends extensions like .encryptedbybert or .encrypted_by_bert. BERT uses AES encryption, and later variants feature optimized multithreading via ConcurrentQueue and DiskWorker threads. Analysts note code similarities with REvil and Babuk ESXi lockers, potentially pointing to shared development lineage or code reuse.
External Analysis7
| External Analysis |
|---|
| https://www.watchguard.com/wgrd-security-hub/ransomware-tracker/bert |
| https://www.csoonline.com/article/4019468/trend-micro-flags-bert-a-rapidly-growing-ransomware-threat.html |
| https://securityboulevard.com/2025/07/new-bert-ransomware-evolves-with-multiple-variants/ |
| https://www.halcyon.ai/blog/bert-ransomwares-first-moves-kill-the-vms-kill-the-backups |
| https://www.darkreading.com/cyber-risk/bert-blitzes-linux-windows-systems |
| https://www.fortra.com/blog/bert-ransomware-what-you-need-know |
| https://theravenfile.com/2025/06/16/bert-ransomware/ |