New Ransomware Group Everest Targets Healthcare and Tech Firms

Edward Zhou
Edward Zhou

CEO & Founder

 
July 16, 2025 2 min read

Ransomware Group everest Hits: Rezayat Group

In a recent cybersecurity incident, the Rezayat Group suffered a ransomware attack by the group known as everest. This data breach was discovered on July 13, 2025, following the actual breach occurring on July 8, 2025.

Incident Report

AttributeInformation
Target OrganizationRezayat Group
Threat Groupeverest
SummaryRezayat Group is a diversified multinational conglomerate based in Saudi Arabia, engaged in sectors such as oil & gas, petrochemicals, power generation, construction, real estate, trading, and healthcare. They collaborate with various global partners to provide services and products worldwide.
Date of BreachJuly 8, 2025
Discovery DateJuly 13, 2025
RegionSaudi Arabia
Business SectorManufacturing

Organizations can check if their data has been exposed using the free Data Breach Checker.

Disclaimer: HookPhish does not engage in the exfiltration, downloading, taking, hosting, viewing, reposting, or disclosure of any stolen information. All reported breach data is sourced from publicly available threat intelligence feeds for awareness purposes only.

Beware of Bert: New Ransomware Group Targets Healthcare and Tech Firms

A new ransomware group named Bert has been reported to breach organizations across Asia, Europe, and the U.S., particularly targeting the healthcare, technology, and event services sectors. Researchers from Trend Micro first identified the group in April 2023, detailing their findings in a report.

malware map
Image courtesy of The Record from Recorded Future News

The ransomware has been known to infect both Windows and Linux systems. Although the method of initial access remains unclear, researchers found a PowerShell script that disables security tools on the infected systems before downloading and executing the ransomware.

Once the ransomware is inside a system, it leaves a ransom note stating: “Hello from Bert! Your network is hacked and files are encrypted,” along with instructions for contacting the attackers to negotiate payment. The ransomware is under active development, with several variants observed.

While no specific actor has been formally linked to these attacks, the use of Russian infrastructure may indicate ties to groups operating in or affiliated with the region. Some researchers suggest that Bert may have roots in the Linux variant of REvil, a notorious ransomware gang that was dismantled in 2021. Elements of REvil's code appear to have been reused in Bert.

Earlier in June, a Russian court sentenced members of the REvil gang to five years in prison but released them immediately after the verdict, citing time served in pre-trial detention. This case was unrelated to REvil’s high-profile ransomware attacks and involved trafficking stolen payment data and the use of malicious software for carding fraud.

Edward Zhou
Edward Zhou

CEO & Founder

 

CEO & Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions..

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

By Edward Zhou July 19, 2025 3 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article