Inactive ransomware operator
← All groupsbert
7 victims indexed · first seen 1 year ago · last activity 11 months ago
At a glance
- Status
- inactive
- First seen
- 1 year ago
- Last activity
- 11 months ago
- Onion sites
- 1 known endpoint
- Primary sector
- Not Found · 2 hits
About
References
8 linksExternal sources curated by the MISP threat-intel community.
- ransomlook.io/group/bert
- watchguard.com/wgrd-security-hub/ransomware-tracker/bert
- csoonline.com/article/4019468/trend-micro-flags-bert-a-rapidly-growing-ransomware-threat.html
- securityboulevard.com/2025/07/new-bert-ransomware-evolves-with-multiple-variants/
- halcyon.ai/blog/bert-ransomwares-first-moves-kill-the-vms-kill-the-backups
- darkreading.com/cyber-risk/bert-blitzes-linux-windows-systems
- fortra.com/blog/bert-ransomware-what-you-need-know
- theravenfile.com/2025/06/16/bert-ransomware/
Timeline
3 monthsTop countries
Top sectors
MITRE ATT&CK
56 techniques · 13 tacticsTactics
Techniques
- T1003.002Security Account Manager
- T1003.003NTDS
- T1003.004LSA Secrets
- T1005Data from Local System
- T1012Query Registry
- T1016System Network Configuration Discovery
- T1018Remote System Discovery
- T1021.001Remote Desktop Protocol
- T1033System Owner/User Discovery
- T1036.010Masquerade Account Name
- T1053.005Scheduled Task
- T1059Command and Scripting Interpreter
- T1059.001PowerShell
- T1059.003Windows Command Shell
- T1059.006Python
- T1069.002Domain Groups
- T1070.004File Deletion
- T1071.002File Transfer Protocols
- T1074.001Local Data Staging
- T1078Valid Accounts
- T1083File and Directory Discovery
- T1087.002Domain Account
- T1098.007Additional Local or Domain Groups
- T1105Ingress Tool Transfer
- T1110Brute Force
- T1110.002Password Cracking
- T1112Modify Registry
- T1113Screen Capture
- T1114.002Remote Email Collection
- T1133External Remote Services
- T1135Network Share Discovery
- T1136.001Local Account
- T1187Forced Authentication
- T1189Drive-by Compromise
- T1190Exploit Public-Facing Application
- T1195.002Compromise Software Supply Chain
- T1203Exploitation for Client Execution
- T1204.002Malicious File
- T1210Exploitation of Remote Services
- T1221Template Injection
- T1505.003Web Shell
- T1547.001Registry Run Keys / Startup Folder
- T1560Archive Collected Data
- T1564.002Hidden Users
- T1566.001Spearphishing Attachment
- T1583.001Domains
- T1583.003Virtual Private Server
- T1584.004Server
- T1588.002Tool
- T1591.002Business Relationships
- T1595.002Vulnerability Scanning
- T1598.002Spearphishing Attachment
- T1598.003Spearphishing Link
- T1608.004Drive-by Target
- T1685.005Clear Windows Event Logs
- T1686Disable or Modify System Firewall
Recent victims
Loading…
Onion infrastructure
1 known- http://bertblogsoqmm4ow7nqyh5ik7etsmefdbf25stauecytvwy7tkgizhad.onion
Source
Updated 11 months agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
