Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Bearlyfy Group Intensifies Cyber Attacks on Russian Firms

Bearlyfy Group Intensifies Cyber Attacks on Russian Firms

Posted on March 27, 2026 By CWS

A pro-Ukrainian hacking group known as Bearlyfy has launched over 70 cyber attacks on Russian businesses since its emergence in January 2025. Recently, the group has been deploying a unique ransomware strain named GenieLocker against its targets, according to the cybersecurity firm F6. Bearlyfy’s operations are driven by the dual motives of financial extortion and sabotage.

Bearlyfy’s Evolution and Tactics

Initially identified by F6 in September 2025, Bearlyfy, also referred to as Labubu, utilized encryptors linked to LockBit 3 (Black) and Babuk. Their early campaigns were directed at smaller enterprises, demanding ransoms as high as €80,000 (around $92,100). By August 2025, they had victimized at least 30 entities. In May 2025, the group adopted a modified version of the PolyVice ransomware, commonly used by Vice Society, to enhance their attack strategies.

The group’s methodologies reveal connections to PhantomCore, another collective that supports Ukrainian interests and has targeted Russian and Belarusian companies since 2022. Bearlyfy is also reportedly cooperating with Head Mare. Their attack strategy involves exploiting external services and weak applications to gain initial access, followed by deploying tools like MeshAgent for remote access, enabling data encryption or alteration.

Distinctive Attack Patterns

Bearlyfy is characterized by its rapid and aggressive attack tactics, often requiring minimal preparation. Unlike conventional ransomware operations, the group manually crafts ransom notes to communicate with victims, applying psychological pressure to compel payment. F6 reports that approximately 20% of targets succumb to these demands, with ransom demands escalating to hundreds of thousands of dollars.

In a notable shift, Bearlyfy has developed its proprietary ransomware, GenieLocker, targeting Windows systems since March 2026. This new ransomware family draws inspiration from the Venus and Trinity ransomware families. Despite the automatic generation of ransom notes by the locker itself, Bearlyfy prefers to use personalized methods to communicate with victims, adding an extra layer of coercion.

Impact and Future Developments

Bearlyfy’s evolution from a less sophisticated group to a significant threat underscores its growing capability to disrupt Russian businesses, including large-scale enterprises. Their activities have established a substantial illicit revenue stream, highlighting the urgent need for enhanced cybersecurity measures.

As Bearlyfy continues to refine its techniques and expand its reach, understanding their operational tactics and strengthening defenses against such cyber threats becomes crucial for potential targets. The group’s persistent threat emphasizes the importance of proactive cybersecurity strategies to mitigate risks and protect critical infrastructure.

The Hacker News Tags:APT campaigns, Bearlyfy, cyber attacks, Cybersecurity, data encryption, F6, financial extortion, GenieLocker, PhantomCore, PolyVice, Ransomware, Russian companies, threat intelligence, Windows ransomware

Post navigation

Previous Post: Critical Windows Flaw Allows SYSTEM Level Access
Next Post: iOS Exploit Kit Coruna Updates Past Exploits

Related Posts

OpenAI Unveils Codex Security for Vulnerability Detection OpenAI Unveils Codex Security for Vulnerability Detection The Hacker News
Webinar on Securing AI Agents Against Cyber Threats Webinar on Securing AI Agents Against Cyber Threats The Hacker News
TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs The Hacker News
Why IT Admins Choose Samsung for Mobile Security Why IT Admins Choose Samsung for Mobile Security The Hacker News
Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs The Hacker News
WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Telnyx Package Breach: TeamPCP’s Latest Supply Chain Attack
  • TP-Link Addresses Critical Flaws in Archer Routers
  • Geopolitical Tensions Fuel Cyber Conflict
  • PXA Stealer Targets Financial Firms with Phishing Attacks
  • iOS Exploit Kit Coruna Updates Past Exploits

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Telnyx Package Breach: TeamPCP’s Latest Supply Chain Attack
  • TP-Link Addresses Critical Flaws in Archer Routers
  • Geopolitical Tensions Fuel Cyber Conflict
  • PXA Stealer Targets Financial Firms with Phishing Attacks
  • iOS Exploit Kit Coruna Updates Past Exploits

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark