Skip to content

Hide Navigation Hide TOC

Bianlian (2019d150-6073-4e3f-b6a5-64b919a87ce9)

BianLian used subtle techniques to exploit, enumerate, and move laterally in victim networks to remain undetected and aggressively worked to counter Endpoint Detection & Response (EDR) protections during the encryption phase of their operations. The group has displayed signs of being new to the practical business aspects of ransomware and associated logistics. Generally they seemed to be experiencing the growing pains of a group of talented hackers new to this aspect of criminal extortion.

Infrastructure associated with the BianLian group first appeared online in December 2021 and their toolset appears to have been under active development since then. Finally, we have observed the BianLian threat actor tripling their known command and control (C2) infrastructure in the month of August, suggesting a possible increase in the actor’s operational tempo.

Cluster A Galaxy A Cluster B Galaxy B Level
Bianlian (2019d150-6073-4e3f-b6a5-64b919a87ce9) Ransomware Hydra (2e4f26d6-f220-4877-be0e-45059b0f8eeb) Ransomware 1