New Ransomware Group Everest Targets Healthcare and Tech Firms

Edward Zhou
Edward Zhou

CEO & Co-Founder

 
July 17, 2025 2 min read

Ransomware Group everest Hits: Rezayat Group

In a recent cybersecurity incident, the Rezayat Group suffered a ransomware attack by the group known as everest. This data breach was discovered on July 13, 2025, following the actual breach occurring on July 8, 2025.

Incident Report

Attribute Information
Target Organization Rezayat Group
Threat Group everest
Summary Rezayat Group is a diversified multinational conglomerate based in Saudi Arabia, engaged in sectors such as oil & gas, petrochemicals, power generation, construction, real estate, trading, and healthcare. They collaborate with various global partners to provide services and products worldwide.
Date of Breach July 8, 2025
Discovery Date July 13, 2025
Region Saudi Arabia
Business Sector Manufacturing

Organizations can check if their data has been exposed using the free Data Breach Checker.

Disclaimer: HookPhish does not engage in the exfiltration, downloading, taking, hosting, viewing, reposting, or disclosure of any stolen information. All reported breach data is sourced from publicly available threat intelligence feeds for awareness purposes only.

Beware of Bert: New Ransomware Group Targets Healthcare and Tech Firms

A new ransomware group named Bert has been reported to breach organizations across Asia, Europe, and the U.S., particularly targeting the healthcare, technology, and event services sectors. Researchers from Trend Micro first identified the group in April 2023, detailing their findings in a report.

malware map

Image courtesy of The Record from Recorded Future News

The ransomware has been known to infect both Windows and Linux systems. Although the method of initial access remains unclear, researchers found a PowerShell script that disables security tools on the infected systems before downloading and executing the ransomware.

Once the ransomware is inside a system, it leaves a ransom note stating: “Hello from Bert! Your network is hacked and files are encrypted,” along with instructions for contacting the attackers to negotiate payment. The ransomware is under active development, with several variants observed.

While no specific actor has been formally linked to these attacks, the use of Russian infrastructure may indicate ties to groups operating in or affiliated with the region. Some researchers suggest that Bert may have roots in the Linux variant of REvil, a notorious ransomware gang that was dismantled in 2021. Elements of REvil's code appear to have been reused in Bert.

Earlier in June, a Russian court sentenced members of the REvil gang to five years in prison but released them immediately after the verdict, citing time served in pre-trial detention. This case was unrelated to REvil’s high-profile ransomware attacks and involved trafficking stolen payment data and the use of malicious software for carding fraud.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

Instagram Vulnerability Exposes Private Data of Millions
Instagram security

Instagram Vulnerability Exposes Private Data of Millions

Instagram's private posts exposed, millions affected by data breaches, and new location features pose risks. Discover how Gopher Security's AI-powered Zero-Trust architecture protects your data. Learn more!

By Brandon Woo January 27, 2026 4 min read
common.read_full_article
Closing the Cloud Complexity Gap: Insights from 2026 Security Reports
cloud security

Closing the Cloud Complexity Gap: Insights from 2026 Security Reports

Navigate the escalating complexity of cloud security. Discover how AI, Zero-Trust, and unified ecosystems are essential to combatting modern threats. Learn more!

By Divyansh Ingle January 26, 2026 6 min read
common.read_full_article
AI-Driven Cybersecurity Innovations: The Future of Threat Prevention
AI agents security

AI-Driven Cybersecurity Innovations: The Future of Threat Prevention

AI agents are prime targets for cyberattacks. Discover evolving threats like prompt injection & AI-powered exploits, and learn how to fortify your defenses. Read now!

By Brandon Woo January 22, 2026 5 min read
common.read_full_article
GootLoader Malware Evades Detection Using Nested ZIP Archives
GootLoader

GootLoader Malware Evades Detection Using Nested ZIP Archives

GootLoader is back with advanced tricks, using malformed ZIPs to bypass security & target businesses. Learn how to detect and defend against this threat. Protect your assets!

By Edward Zhou January 21, 2026 3 min read
common.read_full_article