Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Bearlyfy Group Intensifies Cyber Attacks on Russian Firms

Bearlyfy Group Intensifies Cyber Attacks on Russian Firms

Posted on March 27, 2026 By CWS

A pro-Ukrainian hacking group known as Bearlyfy has launched over 70 cyber attacks on Russian businesses since its emergence in January 2025. Recently, the group has been deploying a unique ransomware strain named GenieLocker against its targets, according to the cybersecurity firm F6. Bearlyfy’s operations are driven by the dual motives of financial extortion and sabotage.

Bearlyfy’s Evolution and Tactics

Initially identified by F6 in September 2025, Bearlyfy, also referred to as Labubu, utilized encryptors linked to LockBit 3 (Black) and Babuk. Their early campaigns were directed at smaller enterprises, demanding ransoms as high as €80,000 (around $92,100). By August 2025, they had victimized at least 30 entities. In May 2025, the group adopted a modified version of the PolyVice ransomware, commonly used by Vice Society, to enhance their attack strategies.

The group’s methodologies reveal connections to PhantomCore, another collective that supports Ukrainian interests and has targeted Russian and Belarusian companies since 2022. Bearlyfy is also reportedly cooperating with Head Mare. Their attack strategy involves exploiting external services and weak applications to gain initial access, followed by deploying tools like MeshAgent for remote access, enabling data encryption or alteration.

Distinctive Attack Patterns

Bearlyfy is characterized by its rapid and aggressive attack tactics, often requiring minimal preparation. Unlike conventional ransomware operations, the group manually crafts ransom notes to communicate with victims, applying psychological pressure to compel payment. F6 reports that approximately 20% of targets succumb to these demands, with ransom demands escalating to hundreds of thousands of dollars.

In a notable shift, Bearlyfy has developed its proprietary ransomware, GenieLocker, targeting Windows systems since March 2026. This new ransomware family draws inspiration from the Venus and Trinity ransomware families. Despite the automatic generation of ransom notes by the locker itself, Bearlyfy prefers to use personalized methods to communicate with victims, adding an extra layer of coercion.

Impact and Future Developments

Bearlyfy’s evolution from a less sophisticated group to a significant threat underscores its growing capability to disrupt Russian businesses, including large-scale enterprises. Their activities have established a substantial illicit revenue stream, highlighting the urgent need for enhanced cybersecurity measures.

As Bearlyfy continues to refine its techniques and expand its reach, understanding their operational tactics and strengthening defenses against such cyber threats becomes crucial for potential targets. The group’s persistent threat emphasizes the importance of proactive cybersecurity strategies to mitigate risks and protect critical infrastructure.

The Hacker News Tags:APT campaigns, Bearlyfy, cyber attacks, Cybersecurity, data encryption, F6, financial extortion, GenieLocker, PhantomCore, PolyVice, Ransomware, Russian companies, threat intelligence, Windows ransomware

Post navigation

Previous Post: Critical Windows Flaw Allows SYSTEM Level Access
Next Post: iOS Exploit Kit Coruna Updates Past Exploits

Related Posts

Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads The Hacker News
New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch The Hacker News
Zero Trust Data Movement: The Overlooked Challenge Zero Trust Data Movement: The Overlooked Challenge The Hacker News
Secure Vibe Coding: The Complete New Guide Secure Vibe Coding: The Complete New Guide The Hacker News
Entra ID Data Protection: Essential or Overkill? Entra ID Data Protection: Essential or Overkill? The Hacker News
April Patch Tuesday: Critical Vulnerabilities Addressed April Patch Tuesday: Critical Vulnerabilities Addressed The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals
  • AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns
  • Frame Security Launches with $50M for AI Cyber Training
  • AI-Powered Zero-Day Exploit Bypasses 2FA Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals
  • AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns
  • Frame Security Launches with $50M for AI Cyber Training
  • AI-Powered Zero-Day Exploit Bypasses 2FA Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark