bert ransomware disables vmware esxi

BERT ransomware has emerged as a sophisticated threat particularly engineered to target VMware ESXi virtualization infrastructure, forcing immediate shutdowns of virtual machines before encrypting critical system files using AES algorithms. This virtualization-aware malware strain first appeared in April 2025, thereafter impacting organizations across healthcare, technology, and construction sectors globally.

BERT ransomware specifically targets VMware ESXi systems, shutting down virtual machines before encrypting files with sophisticated AES encryption methods.

The ransomware employs a methodical attack sequence designed to maximize operational disruption and eliminate recovery options. Initially, BERT executes the `esxcli vm process kill` command to forcibly power off all active virtual machines running on compromised ESXi hosts. This forced shutdown strategy deliberately invalidates live snapshots, effectively undermining standard disaster recovery protocols that organizations typically rely upon for rapid restoration.

Following VM termination, the malware targets underlying virtual disk and configuration files for encryption, utilizing multi-threaded processing capabilities with up to 50 concurrent threads. This approach allows rapid file locking across Linux-based systems during evasion of detection mechanisms. The ransomware particularly disables snapshot-based backup and recovery workflows, creating additional barriers to data restoration without ransom payment.

BERT demonstrates notable technical sophistication through its dual-platform capabilities. Windows variants employ PowerShell-based loaders for privilege escalation and security control disabling, while Linux versions utilize ConcurrentQueue and disk workers for real-time encryption as files are identified. Recent variants show evolutionary improvements in encryption efficiency between versions. The threat group employs double-extortion tactics to maximize pressure on victims and increase the likelihood of ransom payment.

Threat actors gain initial access through exploiting unpatched vulnerabilities and utilizing stolen or brute-forced credentials. Security researchers have identified potential linkages to Russian threat actor infrastructure, with possible code lineage from Linux variants of the REvil ransomware group. The group operates under various aliases, including “Water Pombero,” targeting victims across the United States, Europe, Asia, and Latin America. Attackers frequently leverage weak SSH passwords alongside compromised vCenter credentials to establish their initial foothold in target environments.

Organizations face immediate operational challenges when BERT strikes, as the streamlined encryption process occurs before defensive measures can be enacted. Key indicators include sudden VM shutdowns, loss of access to VM files, abnormal shell commands in ESXi hosts, and ransom notes typically stating “Hello from Bert Your network is hacked and files are encrypted.”

You May Also Like

Elite Law Firms Under Siege: FBI Exposes Ruthless Silent Ransom Group Campaign

Elite law firms face devastating attacks as Silent Ransom Group wreaks havoc, causing $4.88M in damages and exposing confidential client data across the industry.

Ransomware Explodes 46% as Industrial OT Systems Become Prime Cybercrime Targets in 2025

Industrial systems are now cybercriminals’ favorite prey, with ransomware attacks skyrocketing 46% and wreaking $57 billion in damages. Your operations could be next.

Ransomware Gangs Hijack Unpatched SimpleHelp Servers to Rip Through Critical Systems Worldwide

Ransomware gangs weaponize SimpleHelp servers worldwide, leaving a devastating trail of 510 victims. Your organization could be next if critical patches aren’t deployed.

FBI Sounds Alarm on Raging Cyberattacks as Ransomware Cripples Critical Sectors

Cybercriminals are crippling America’s vital sectors while the FBI desperately races to stop the worst ransomware epidemic in history. Will your data survive?