Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

BianLian Shifts to Data Extortion Tactics

November 22, 2024
Reading Time: 2 mins read
in News
BianLian Shifts to Data Extortion Tactics

The FBI has issued a new advisory revealing that the notorious BianLian ransomware group is likely based in Russia, with multiple Russian affiliates. The group, previously known for its ransomware attacks on organizations such as Save The Children and Boston Children’s Health Physicians, has recently shifted tactics. Instead of relying on traditional ransomware encryption, BianLian now focuses exclusively on exfiltrating data from victims and extorting them for ransom. This shift began in January 2024, marking a significant change in their operations and strategy.

The FBI and the Australian Cyber Security Centre have observed BianLian exploiting critical vulnerabilities in public-facing applications, particularly within Windows and ESXi infrastructure. Notably, the group has leveraged the ProxyShell vulnerabilities (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) to gain initial access. They have also exploited CVE-2022-37969, a vulnerability affecting Windows 10 and 11, further expanding their reach. This shift in their approach indicates a growing sophistication in their tactics, as they adapt to avoid detection and improve the success of their extortion schemes.

To maintain access and navigate through compromised systems, BianLian has been observed creating multiple administrator accounts within victim networks. The group has also ramped up its psychological pressure on victims, printing ransom notes on company printers and even contacting employees directly. These tactics are designed to increase fear and urgency, pushing victims to pay the ransom. The ransom notes now threaten to leak sensitive exfiltrated data if the demands are not met, increasing the stakes for affected organizations.

In response to the group’s evolving tactics, the FBI has advised organizations to bolster their defenses and stay vigilant. The BianLian ransomware group’s shift from encryption-based attacks to data exfiltration and extortion marks a new phase in the ransomware landscape. With their ability to target critical vulnerabilities and apply mounting pressure on victims, BianLian is emerging as a major threat to both private and public sector entities. This highlights the urgent need for improved cybersecurity measures and collaboration across international law enforcement to combat the growing threat of ransomware.

Reference:

  • FBI Identifies BianLian Ransomware Shifting to Data Extortion Tactics
Tags: BianLian ransomwareCyber NewsCyber News 2024Cyber threatsFBIHealthNovember 2024Russia
ADVERTISEMENT

Related Posts

Chrome Sandbox Escape Earns $250K

Embargo Gang Made $34M in a Year

August 12, 2025
Chrome Sandbox Escape Earns $250K

Chrome Sandbox Escape Earns $250K

August 12, 2025
Chrome Sandbox Escape Earns $250K

Privacy Watchdog Sues Optus Over Breach

August 12, 2025
8 Nations Miss EU NIS2 Deadline

8 Nations Miss EU NIS2 Deadline

August 11, 2025
8 Nations Miss EU NIS2 Deadline

Scattered Spider Lists Attacks on Telegram

August 11, 2025
8 Nations Miss EU NIS2 Deadline

MedusaLocker Seeks Pentesters

August 11, 2025

Latest Alerts

Win-DDoS Flaws Enable DC DDoS Botnets

GPT-5 Jailbreak, Zero-Click AI Threats

7-Zip Flaw Enables Arbitrary Code Run

Tesla-Themed Malware in Google Ads

Lenovo Linux Webcam BadUSB Flaw

WinRAR Zero-Day Actively Exploited

Subscribe to our newsletter

    Latest Incidents

    Columbia Data Breach Hits 900K

    Chinese Gang Hits 115M US Payment Cards

    Yes24 Down After Cyberattack

    University of WA Major Data Breach

    Google Ads Customers’ Data Breach

    Connex Credit Union Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial