Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Bearlyfy Group Intensifies Cyber Attacks on Russian Firms

Bearlyfy Group Intensifies Cyber Attacks on Russian Firms

Posted on March 27, 2026 By CWS

A pro-Ukrainian hacking group known as Bearlyfy has launched over 70 cyber attacks on Russian businesses since its emergence in January 2025. Recently, the group has been deploying a unique ransomware strain named GenieLocker against its targets, according to the cybersecurity firm F6. Bearlyfy’s operations are driven by the dual motives of financial extortion and sabotage.

Bearlyfy’s Evolution and Tactics

Initially identified by F6 in September 2025, Bearlyfy, also referred to as Labubu, utilized encryptors linked to LockBit 3 (Black) and Babuk. Their early campaigns were directed at smaller enterprises, demanding ransoms as high as €80,000 (around $92,100). By August 2025, they had victimized at least 30 entities. In May 2025, the group adopted a modified version of the PolyVice ransomware, commonly used by Vice Society, to enhance their attack strategies.

The group’s methodologies reveal connections to PhantomCore, another collective that supports Ukrainian interests and has targeted Russian and Belarusian companies since 2022. Bearlyfy is also reportedly cooperating with Head Mare. Their attack strategy involves exploiting external services and weak applications to gain initial access, followed by deploying tools like MeshAgent for remote access, enabling data encryption or alteration.

Distinctive Attack Patterns

Bearlyfy is characterized by its rapid and aggressive attack tactics, often requiring minimal preparation. Unlike conventional ransomware operations, the group manually crafts ransom notes to communicate with victims, applying psychological pressure to compel payment. F6 reports that approximately 20% of targets succumb to these demands, with ransom demands escalating to hundreds of thousands of dollars.

In a notable shift, Bearlyfy has developed its proprietary ransomware, GenieLocker, targeting Windows systems since March 2026. This new ransomware family draws inspiration from the Venus and Trinity ransomware families. Despite the automatic generation of ransom notes by the locker itself, Bearlyfy prefers to use personalized methods to communicate with victims, adding an extra layer of coercion.

Impact and Future Developments

Bearlyfy’s evolution from a less sophisticated group to a significant threat underscores its growing capability to disrupt Russian businesses, including large-scale enterprises. Their activities have established a substantial illicit revenue stream, highlighting the urgent need for enhanced cybersecurity measures.

As Bearlyfy continues to refine its techniques and expand its reach, understanding their operational tactics and strengthening defenses against such cyber threats becomes crucial for potential targets. The group’s persistent threat emphasizes the importance of proactive cybersecurity strategies to mitigate risks and protect critical infrastructure.

The Hacker News Tags:APT campaigns, Bearlyfy, cyber attacks, Cybersecurity, data encryption, F6, financial extortion, GenieLocker, PhantomCore, PolyVice, Ransomware, Russian companies, threat intelligence, Windows ransomware

Post navigation

Previous Post: Critical Windows Flaw Allows SYSTEM Level Access
Next Post: iOS Exploit Kit Coruna Updates Past Exploits

Related Posts

Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login The Hacker News
SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day The Hacker News
Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution The Hacker News
Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine The Hacker News
Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware The Hacker News
Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Introduces Bug Bounty for AI Safety Risks
  • New Phishing Attack Targets TikTok Business Accounts
  • Cyberattack Targets South Asian Financial Firm with Custom Malware
  • RSAC 2026: Key Highlights from Days 3-4
  • Telnyx Package Breach: TeamPCP’s Latest Supply Chain Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Introduces Bug Bounty for AI Safety Risks
  • New Phishing Attack Targets TikTok Business Accounts
  • Cyberattack Targets South Asian Financial Firm with Custom Malware
  • RSAC 2026: Key Highlights from Days 3-4
  • Telnyx Package Breach: TeamPCP’s Latest Supply Chain Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark