> Back to All Posts

BERT Ransomware: A New Threat Targeting ESXi Virtual Machines

BERT Ransomware

A new cross-platform ransomware strain, known as BERT, has emerged, posing a significant threat to organizations running VMware ESXi environments. This article explores how BERT ransomware operates, its unique features, and how businesses can defend against it.

What is BERT Ransomware?

First identified in April 2025, BERT ransomware targets Windows, Linux, and ESXi systems. Its primary focus on ESXi virtual machines has raised alarms in the cybersecurity community, as these environments often host critical enterprise applications.

How BERT Ransomware Attacks ESXi

Shutdown of Virtual Machines

BERT executes commands such as esxcli vm process kill to forcibly shut down virtual machines, disrupting business operations and corrupting snapshot backups.

Accelerated Encryption

On Linux and ESXi systems, BERT uses up to 50 threads to quickly encrypt disk images, including .vmdk, .vmem, and .vmsd files.

Destruction of Backups

The ransomware deletes snapshots and logs to hinder recovery efforts, increasing the likelihood of ransom payment.

Technical Details and Origins

Code Similarities

BERT shares code with previous ransomware families like REvil and Babuk, suggesting it is built on repurposed frameworks.

Windows Variant

The Windows version uses PowerShell to disable security features and deploy the ransomware payload via remote servers.

Industries Targeted

BERT has already targeted organizations in sectors including healthcare, technology, and event services. These are all industries heavily reliant on virtual infrastructure.

Indicators of Compromise (IOCs)

  • Known malware hashes and command-and-control (C2) IP addresses.
  • Unusual ESXi activity, such as mass VM shutdowns or snapshot deletions.
  • Disabling of antivirus and endpoint detection tools.

Defense Strategies

To protect against BERT ransomware, organizations should:

  • Patch Systems: Apply all critical updates to ESXi, vCenter, and related systems.
  • Restrict Access: Enforce multi-factor authentication, limit administrative privileges, and disable unnecessary remote access.
  • Secure Backups: Implement immutable, offline backups to ensure recovery even if primary systems are compromised.
  • Monitor Systems: Use SIEM and EDR solutions to detect unusual activities, such as mass VM shutdowns or snapshot deletions.
  • Conduct Drills: Regularly test incident response and disaster recovery plans.

Final Thoughts

BERT ransomware represents a dangerous evolution in cyber threats by directly targeting the heart of enterprise IT: virtual environments. With proactive defenses and vigilant monitoring, organizations can reduce their exposure to this emerging menace.

Stay informed and prepared, because in cybersecurity, awareness is your first line of defense.

Janet Andersen

Janet is an experienced content creator with a strong focus on cybersecurity and online privacy. With extensive experience in the field, she’s passionate about crafting in-depth reviews and guides that help readers make informed decisions about digital security tools. When she’s not managing the site, she loves staying on top of the latest trends in the digital world.