CVEDNA

Version AMP - Chargement ultra-rapide

Bearlyfy Group Deploying Custom GenieLocker Ransomware Against Russian Firms

Bearlyfy's Emergence as a Pro-Ukrainian Cyber Threat

The cybersecurity landscape has witnessed the emergence of a new threat actor group, Bearlyfy, which has been actively targeting Russian companies since early 2025. This pro-Ukrainian collective, also known by the alias Labubu, has demonstrated significant operational capabilities through more than 70 identified cyber attacks against Russian enterprises.

Operational Profile and Motivation

Bearlyfy operates as a dual-purpose threat group with the primary objective of inflicting maximum damage upon Russian businesses. The group's activities align with broader geopolitical tensions, positioning itself as a cyber warfare tool supporting Ukrainian interests in the digital domain.

GenieLocker Ransomware Analysis

The most recent attacks by Bearlyfy have leveraged a custom Windows ransomware strain named GenieLocker. This malware variant represents a sophisticated evolution in ransomware development, specifically designed to target corporate environments with enhanced evasion capabilities.

Technical Characteristics of GenieLocker

Threat Assessment and Impact

The deployment of GenieLocker by Bearlyfy demonstrates a significant escalation in cyber warfare tactics. The group's ability to maintain operational secrecy while executing multiple successful attacks highlights their technical sophistication.

Security Implications

Organizations within the Russian business sector face heightened risk from this threat actor's activities. The combination of targeted attacks and custom malware development suggests a well-resourced operation with clear strategic objectives.

Recommendations for Defense

Security professionals should implement comprehensive monitoring protocols to detect potential GenieLocker indicators of compromise. Regular security assessments and network segmentation strategies remain critical defensive measures against such threats.