

A new ransomware strain is making waves, not just for its technical prowess but also for the mystery behind its name: BERT Ransomware. As businesses and individuals race to defend themselves against increasingly complex attacks, BERT stands out for blending classic ransomware tactics with modern evasion techniques. But what exactly is it? And does it really have anything to do with artificial intelligence?
Let’s dive into the anatomy of BERT ransomware; an elusive and deceptive threat that signals where ransomware may be headed next.
Identified in early 2024, BERT ransomware is a new strain that has been phishing users and exploiting vulnerable systems. The cybersecurity community was surprised by the name of this new ransomware, BERT, since it is similar to the well-known Google NLP model, sparking confusion and speculation on what it does.
BERT diverges from the generic ransomware molds as he adopts a more persistent and stealthy approach. Traditionally, ransomware focuses on encryption only. BERT on the other hand, fuses encryption with several other obfuscation techniques. Any data locked and held hostage will demand a payment in cryptocurrency.
BERT ransomware does not in any form relate with AI technology; however, the name injects BERT with a potential marketing use that social engineers and ransomware creators capitalize on.
BERT ransomware operates with a defined infection process to maximize stealth, persistence, and impact. While it does not push the boundaries of the industry in terms of encryption, the BERT ransomware infection cycle reflects a polished and sophisticated delivery and evasion mechanism. The infection cycle includes the following steps:
→ Initial Infection: Entry Point
BERT ransomware usually targets users with in-person social engineering attacks. BERT ransomware uses:
BERT ransomware activates once a user engages with the malicious file, commencing the payload delivery phase.
→ Execution and Payload Deployment
BERT uses fileless payload delivery, only executing it after initial infection. BERT prefers to reside in memory and not be written to the disk, further avoiding detection by signature-based antivirus systems.
Some key behaviors of BERT in execution and payload delivery include but are not limited to:
Modifying the registry to ensure continued control of the infected machine while avoiding detection.
→ Encryption Routine
BERT uses a hybrid encryption approach to encrypt files:
→ Ransom Note Deployment
After the encryption, BERT drops a variant of the README_BERT.txt file, which has the ransom note containing:
BERT has the capability to perform double extortion ie. exfiltrating data before encryption and using the data to blackmail the victim.
→ Command and Control (C2) Communication
BERT uses the C2 for the following:
To stay hidden, BERT can use domain generation algorithms (DGA) to contact C2 infrastructure or use encrypted HTTPS channels.
→ Persistence and Cleanup
BERT executes the following tasks to ensure persistence:
Even though it’s called BERT ransomware, it doesn’t use AI technologies or Google’s natural language processing BERT model (Bidirectional Encoder Representations from Transformers).”
So, what is BERT ransomware aimed at?
In any case, BERT ransomware is simply a well-designed basic malware, and using BERT for branding is still a tactic in itself.
While ransomware tends to follow conventional routes in their attack, BERT has marked itself out by bringing on board elements of social manipulation and psychological maneuvering. BERT stealthily acts and stays out of sight bringing attention only when it wants to be noticed, and only ever delivering what must be delivered when it must be delivered. BERT has perfected the art of hostage-taking, and complies with only an impersonation of what the victim may desire.
Considering the stealthy nature of BERT ransomware, a proactive approach combined with layered defenses is a requirement. Protecting your environment can be achieved by:
◊ Detection Tips
◊ Prevention Strategies
Swift action is the best way to minimize the damage caused by a suspected BERT ransomware infection.
BERT ransomware serves as a warning sign of what’s to come, malware strains that not only evolve technically but also manipulate perception through clever naming and social engineering. While BERT isn’t AI-driven, its deceptive nature is a blueprint for future attacks that may blend real AI with cyber extortion.
The best defense? Preparedness, vigilance, and resilience. Invest in layered security, educate your workforce, and stay updated on threat intelligence. Cyber attackers are innovating, it’s time defenders do the same.
WhatsApp us