Search for an article

Select a plan

Choose a plan from below, subscribe, and get access to our exclusive articles!

Monthly plan

$
13
$
0
billed monthly

Yearly plan

$
100
$
0
billed yearly

All plans include

  • Donec sagittis elementum
  • Cras tempor massa
  • Mauris eget nulla ut
  • Maecenas nec mollis
  • Donec feugiat rhoncus
  • Sed tristique laoreet
  • Fusce luctus quis urna
  • In eu nulla vehicula
  • Duis eu luctus metus
  • Maecenas consectetur
  • Vivamus mauris purus
  • Aenean neque ipsum
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

HomeCII/OTBianLian Cybercrime Group Adopts New Extortion Techniques, CISA Issues Alert

BianLian Cybercrime Group Adopts New Extortion Techniques, CISA Issues Alert

Published on

spot_img

The US Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory, along with the Federal Bureau of Investigation (FBI) and the Australian Cyber Security Centre (ACSC), warning organizations of attacks made by ransomware developer and data extortion group, BianLian.

BianLian has been active since 2022 and typically employs a double-extortion model whereby it encrypts a victim’s systems and steals their data, threatening to release the acquired data if payment is not made. However, in January, the group shifted its attack methods to focus on exfiltration-based extortion rather than leading with encryption, according to the alert.

The gang uses stolen remote desktop protocol (RDP) credentials to access victims’ networks and open-source tools and command-line scripting to navigate it. Finally, it exfiltrates data through File Transfer Protocol (FTP), Rclone, or Mega before extorting its victims.

In March, cybersecurity service provider Redacted released research on the group, detailing its high-level operational security and skill penetration, and its continued growth while operating as a ransomware organization. BianLian’s tactics, techniques, and procedures (TTPs) have allowed the gang to target critical infrastructure organizations in the US and Australia, as well as professional services and property development organizations.

Responding to the advisory, Tom Kellerman, senior vice president of cyberstrategy at Contrast Security, said that “extortion via data leak is the modus operandi of choice” for BianLian. Kellerman attributed this shift to the successful collaboration between law enforcement and the cyber community to decrypt the ransomware and disrupt the infrastructure that sustains it.

CISA has urged organizations to implement mitigations provided in the advisory, such as auditing remote access tools, reviewing logs for execution of remote access software, and enabling enhanced PowerShell logging, in response to these attacks.

Source link

Latest articles

Payment with EC cards not accepted at Spar stores

The cyber attack on Spar and its TopCC stores left customers unable to pay...

DeepSeek R1 Jailbreaked for Malicious Purposes, Developing Keyloggers and Ransomware

The rise in the usage of generative artificial intelligence (GenAI) tools like OpenAI's ChatGPT...

Week in review: NIST selects HQC for post-quantum encryption, 10 classic cybersecurity books.

In a recent development, the National Institute of Standards and Technology (NIST) has chosen...

Uncovering the DevOps Threats: 502 Incidents and 955 Hours of Disruptions in GitHub, GitLab, Atlassian, and Azure DevOps

The DevOps Threats Unwrapped report conducted by the GitProtect research team recently concluded that...

More like this

Payment with EC cards not accepted at Spar stores

The cyber attack on Spar and its TopCC stores left customers unable to pay...

DeepSeek R1 Jailbreaked for Malicious Purposes, Developing Keyloggers and Ransomware

The rise in the usage of generative artificial intelligence (GenAI) tools like OpenAI's ChatGPT...

Week in review: NIST selects HQC for post-quantum encryption, 10 classic cybersecurity books.

In a recent development, the National Institute of Standards and Technology (NIST) has chosen...