By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware
Computing

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

News Room
Last updated: 2026/04/01 at 8:20 AM
News Room Published 1 April 2026
Share
Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware
SHARE

Ravie LakshmananMar 27, 2026Threat Intelligence / Vulnerability

A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting Russian companies since it first surfaced in the threat landscape in January 2025, with recent attacks leveraging a custom Windows ransomware strain codenamed GenieLocker.

“Bearlyfy (also known as Labubu) operates as a dual-purpose group aimed at inflicting maximum damage upon Russian businesses; its attacks serve the dual objectives of extortion for financial gain and acts of sabotage,” Russian security vendor F6 said.

The hacking group was first documented by F6 in September 2025 as leveraging encryptors associated with LockBit 3 (Black) and Babuk, with early intrusions focusing on smaller companies before upping the ante and demanding ransoms to the tune of €80,000 (about $92,100). By August 2025, the group had claimed at least 30 victims.

Beginning May 2025, Bearlyfy actors also utilized a modified version of PolyVice, a ransomware family attributed to Vice Society (aka DEV-0832 or Vanilla Tempest), which has a history of delivering third-party lockers such as Hello Kitty, Zeppelin, RedAlert, and Rhysida ransomware in their attacks. 

Further analysis of the threat actor’s toolset and infrastructure uncovers overlaps with PhantomCore, another group that’s assessed to be operating with Ukrainian interests in mind. It’s known to attack Russian and Belarusian companies since 2022. Beyond PhantomCore, Bearlyfy is also said to have collaborated with Head Mare.

Attacks mounted by the group have obtained initial access through the exploitation of external services and vulnerable applications, followed by dropping tools like MeshAgent to facilitate remote access and enable encryption, destruction, or modification of data. In contrast, PhantomCore conducts APT-style campaigns, where reconnaissance, persistence, and data exfiltration take precedence.

“The group itself is distinguished by rapid-fire attacks characterized by minimal preparation and swift data encryption; another distinctive feature of these attacks is that ransom notes are not generated by the ransomware software itself, but are instead crafted directly by the attackers,” F6 noted last year.

Bearlyfy’s attacks have proven to be an illicit revenue generation stream. Per F6 data, about one in five victims opt to pay the ransom. The initial ransom demands from the adversary is said to have escalated further, reaching hundreds of thousands of dollars.

The most noteworthy shift in the threat actor’s modus operandi is the use of a proprietary ransomware family called GenieLocker to target Windows endpoints since the start of March 2026. GenieLocker’s encryption scheme is inspired by Venus/Trinity ransomware families.

One of the most distinctive traits of the ransomware attacks is that the ransom notes are automatically generated by the locker. Instead, the threat actors opt for their own methods to share the next steps with victims, either just sharing contact details or elaborate messages that seek to exert psychological pressure and force them into paying up.

“While in its early stages, Bearlyfy members demonstrated a lack of sophistication and were clearly experimenting with various techniques and toolsets, within the span of a single year, this group has evolved into a veritable nightmare for Russian businesses — including major enterprises,” F6 said.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article UK Semiconductor Centre appoints new directors – UKTN UK Semiconductor Centre appoints new directors – UKTN
Next Article What's New on Prime Video This April: 'The Boys,' 'Balls Up' and More What's New on Prime Video This April: 'The Boys,' 'Balls Up' and More
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

MP rejects Palantir’s claims that criticism of NHS England deal is ‘ideologically motivated’
MP rejects Palantir’s claims that criticism of NHS England deal is ‘ideologically motivated’
News
'Stranger Things: Tales From '85,' 'Running Point,' 'Beef' and More Are New on Netflix in April
'Stranger Things: Tales From '85,' 'Running Point,' 'Beef' and More Are New on Netflix in April
News
SpaceX reportedly files for IPO but it’s keeping the numbers secret (for now)
SpaceX reportedly files for IPO but it’s keeping the numbers secret (for now)
News
Report: Amazon buys 1,300 acres near Columbia River that could become a giant data center
Report: Amazon buys 1,300 acres near Columbia River that could become a giant data center
Computing

You Might also Like

Report: Amazon buys 1,300 acres near Columbia River that could become a giant data center
Computing

Report: Amazon buys 1,300 acres near Columbia River that could become a giant data center

3 Min Read
HarfBuzz 14.0 Released With New GPU Accelerated Text Rendering Library
Computing

HarfBuzz 14.0 Released With New GPU Accelerated Text Rendering Library

1 Min Read
ByteDance reportedly plans to purchase .6 billion worth of Huawei’s Ascend AI chips · TechNode
Computing

ByteDance reportedly plans to purchase $5.6 billion worth of Huawei’s Ascend AI chips · TechNode

1 Min Read
Ghana’s National ID cards can now make payments |
Computing

Ghana’s National ID cards can now make payments |

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?