More About BianLian Ransomware
Click for details
BianLian is a Golang-based ransomware-as-a-service (RaaS) that has been active since at least 2022. The group previously (from 2022 – 2023) operated a RaaS and used a double extortion method, where the ransomware both encrypted the victim’s machines and exfiltrated sensitive data; the group threated to leak the stolen data if the ransom demand was not paid.
However, in 2023, the group was observed stealing sensitive data and extorting victims, avoiding the encryption portion of a typical ransomware attack. Avast researchers released a decryptor for the BianLian ransomware in 2023, which likely led to the groups’ change in tactics (1).
The IP address, 94.198.50[.]195, has previously been attributed to BianLian operations and is registered in Russia (2). BianLian often uses valid credentials for persistence, defense evasion, and lateral movement. The group extracts credentials from the victim environment, creates new administration accounts, or modifies existing accounts’ passwords to allow incoming RDP traffic.
BianLian encrypts files using the AES256 algorithm and, as opposed to other operations, the AES key is not encrypted by a public key and is not stored in the encrypted files. The malware divided the file content into 10-byte chunks. It reads ten bytes from the original file, then encrypts the bytes, and writes the encrypted data into the target file.
From 2023 April 01 – 2024 March 31, BianLian operators listed 220 victims on their data leak site, with the majority of those victims in the Healthcare vertical and the majority based in the U.S. It is very likely that BianLian has targeted many more victims, as the tracked numbers include only those listed on the group’s data leak site and omits victims that paid the ransom or were not listed for other reasons.