unit42.paloaltonetworks.com
Open in
urlscan Pro
92.123.151.6
Public Scan
Submitted URL: https://unit42.paloaltonetworks.com/bianlian-ransomware-group-threat-assessment/#post-132125-_u6j4jrmuhgk8
Effective URL: https://unit42.paloaltonetworks.com/bianlian-ransomware-group-threat-assessment/
Submission: On November 04 via api from IN — Scanned from DE
Effective URL: https://unit42.paloaltonetworks.com/bianlian-ransomware-group-threat-assessment/
Submission: On November 04 via api from IN — Scanned from DE
Form analysis
1 forms found in the DOMName: Unit42_Subscribe — POST https://www.paloaltonetworks.com/apps/pan/public/formsubmithandler.submitform.json
<form action="https://www.paloaltonetworks.com/apps/pan/public/formsubmithandler.submitform.json" method="post" novalidate="" class="subscribe-form" name="Unit42_Subscribe" id="unit42footerSubscription_form">
<input type="hidden" name="emailFormMask" value="">
<input type="hidden" value="1086" name="formid">
<input type="hidden" value="531-OCS-018" name="munchkinId">
<input type="hidden" value="2141" name="lpId">
<input type="hidden" value="1203" name="programId">
<input type="hidden" value="1086" name="formVid">
<input type="hidden" name="mkto_optinunit42" value="true">
<input type="hidden" name="mkto_opt-in" value="true">
<div class="form-group">
<label for="newsletter-email" id="newsletter-email-label">Your Email</label>
<input type="emal" placeholder="Your Email" name="Email" class="subscribe-field" id="newsletter-email" aria-labelledby="newsletter-email-label">
<p class="error-mail mb-15 text-danger" style="color: #dc3545"></p>
<p>Subscribe for email updates to all Unit 42 threat research.<br>By submitting this form, you agree to our
<a title="Terms of Use" href="https://www.paloaltonetworks.com/legal-notices/terms-of-use" data-page-track="true" data-page-track-value="Get updates from Unit 42:Terms of Use">Terms of Use</a> and acknowledge our
<a title="Privacy Statement" href="https://www.paloaltonetworks.com/legal-notices/privacy" data-page-track="true" data-page-track-value="Get updates from Unit 42:Privacy Statement">Privacy Statement.</a></p>
<div class="g-recaptcha" data-expired-callback="captchaExpires" data-callback="captchaComplete" data-sitekey="6Lc5EhgTAAAAAJa-DzE7EeWABasWg4LKv-R3ao6o"></div>
<p class="error-recaptcha d-none mt-15 text-danger" style="color: #dc3545">Invalid captcha!</p>
<button class="l-btn is-disabled" data-page-track="true" data-page-track-value="footer:Get updates from Unit 42:Subscribe" id="unit42footerSubscription_form_button"> Subscribe <img class="lozad"
data-src="https://unit42.paloaltonetworks.com/wp-content/themes/unit42-v6/dist/images/icons/right-arrow.svg" alt="Right Arrow">
<img src="https://unit42.paloaltonetworks.com/wp-content/themes/unit42-v6/dist/images/icons/icon-loader.svg" alt="loader" class="loader">
</button>
<div class="form-success-message"></div>
</div>
</form>
Text Content
Menu * Tools * ATOMs * Security Consulting * About Us * Under Attack? * * About Unit 42 * Services Services Assess and Test Your Security Controls * AI Security Assessment * Attack Surface Assessment * Breach Readiness Review * BEC Readiness Assessment * Cloud Security Assessment * Compromise Assessment * Cyber Risk Assessment * M&A Cyber Due Diligence * Penetration Testing * Purple Team Exercises * Ransomware Readiness Assessment * SOC Assessment * Supply Chain Risk Assessment * Tabletop Exercises * Unit 42 Retainer Transform Your Security Strategy * IR Plan Development and Review * Security Program Design * Virtual CISO * Zero Trust Advisory Respond in Record Time * Cloud Incident Response * Digital Forensics * Incident Response * Managed Detection and Response * Managed Threat Hunting * Unit 42 Retainer UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more * Unit 42 Threat Research Unit 42 Threat Research Unit 42 Threat Research * Threat Briefs and Assessments Details on the latest cyber threats * Tools Lists of public tools released by our team * Threat Reports Downloadable, in-depth research reports THREAT REPORT 2024 Unit 42 Incident Response Report Read now THREAT BRIEF Russia-Ukraine Cyberattacks: How to Protect Against Related Cyberthreats Including DDoS, HermeticWiper, Gamaredon, Website Defacement Learn more THREAT REPORT Highlights from the Unit 42 Cloud Threat Report, Volume 6 Learn more * Partners Partners Partners * Threat Intelligence Sharing * Law Firms and Insurance Providers THREAT REPORT 2022 Unit 42 Ransomware Threat Report: Understand trends and tactics to bolster defenses Learn more THREAT BRIEF Russia-Ukraine Cyberattacks: How to Protect Against Related Cyberthreats Including DDoS, HermeticWiper, Gamaredon, Website Defacement Learn more THREAT BRIEF Operation Falcon II: Unit 42 Helps Interpol Identify Nigerian Business Email Compromise Ring Members Learn more * Resources Resources Resources * Research Reports * Webinars * Customer Stories * Datasheets * Videos * Infographics * Whitepapers * Cyberpedia Industries * Financial Services * Healthcare * Manufacturing ANALYST REPORT Unit 42® has been named a Leader in “The Forrester Wave™: Cybersecurity Incident Response Services, Q2 2024.” Read the Forrester report to learn why. Get the report THREAT REPORT Unit 42 Threat Frontier Report: Discover the latest insights on how threat actors are leveraging GenAI to exploit vulnerabilities — and learn what steps you can take to protect yourself. Get the report * * Under Attack? Search All * Tech Docs Close search modal * Threat Research Center * High Profile Threats * Ransomware Ransomware THREAT ASSESSMENT: BIANLIAN 10 min read Related Products Advanced URL FilteringAdvanced WildFireCloud-Delivered Security ServicesCortex XDRNext-Generation Firewall * By: * Daniel Frank * Published:January 23, 2024 * Categories: * Cybercrime * High Profile Threats * Ransomware * Tags: * BianLian * Bitter Scorpius * Makop * * Share * * * * * * * This post is also available in: 日本語 (Japanese) EXECUTIVE SUMMARY Unit 42 researchers have been tracking the BianLian ransomware group, which has been in the top 10 of the most active groups based on leak site data we’ve gathered. From that leak site data, we’ve primarily observed activity affecting the healthcare and manufacturing sectors and industries, and impacting organizations mainly in the United States (US) and Europe (EU). We also observed that the BianLian group shares a small, customized tool in common with the Makop ransomware group. This shared tool indicates a possible connection between the two groups, which we will explore further. BianLian has also recently moved from a double extortion scheme to one of extortion without encryption. Rather than encrypting their victims’ assets before stealing data and threatening to publish it if they do not pay the ransom, they’re now moving straight to stealing data to motivate victims to pay. The Unit 42 Incident Response team has responded to several BianLian ransomware incidents since September 2022. Palo Alto Networks customers are better protected against ransomware used by the BianLian ransomware group through Cortex XDR, as well as by Cloud-Delivered Security Services for the Next-Generation Firewall such as WildFire and Advanced URL Filtering. In particular, the Cortex XDR anti-ransomware module included out-of-the-box protections that prevented adverse behavior from the ransomware samples we tested without the need for specific detection logic or signatures. The Prisma Cloud Defender should be deployed on cloud-based Windows virtual machines to ensure they are protected. Cortex Xpanse is able to provide visibility that can prove valuable for proactive protection. The Unit 42 Incident Response team can also be engaged to help with a compromise or to provide a proactive assessment to lower your risk. Related Unit 42 Topics Ransomware, Cybercrime BIANLIAN THREAT OVERVIEW The BianLian group has been extremely active ever since it emerged in 2022, with new organizations compromised by the group being reported on their leak site almost on a weekly basis. Figure 1 below details their activity throughout 2023, as illustrated by their leak site data. Figure 1. Activity of the BianLian group throughout 2023. This group impacts mainly the healthcare, manufacturing, professional and legal services sectors. Their attacks have primarily taken place in North America, but they were also seen in the EU and India. BianLian shares a small custom .NET tool with the Makop ransomware group, which indicates a possible connection between the two groups. BianLian has moved from a double extortion scheme of encrypting their victims’ assets, stealing data, and threatening to publish it if they do not pay the ransom to a main focus of extortion without encryption. The group’s leak site indicates that BianLian might be expanding by hiring new developers and affiliates, as noted in the “Work with us” section from the group's homepage shown below in Figure 2. Figure 2. The BianLian leak site homepage, late December 2023. The BianLian group regularly updates the list of compromised targets on their leak site. Figure 3 details the most affected countries. While BianLian has impacted organizations all over the world, the US is clearly the most affected country as of 2023. Figure 3. A map showing the countries impacted by BianLian in 2023. As detailed in Figure 4 below, healthcare is the sector most affected by the BianLian group, with manufacturing a close second. In January 2023, the group claimed to have exfiltrated 1.7 TB of data, including personal data of patients and employees, from a California-based hospital. Attacks on healthcare organizations are especially concerning because they disrupt hospitals’ day-to-day operations and potentially endanger patients' lives. Figure 4. The distribution of the sectors that BianLian attacked in 2023. POSSIBLE CONNECTION TO MAKOP RANSOMWARE During our analysis, we noticed a small .NET custom executable was shared between the BianLian and Makop ransomware groups. Both groups also used the same hash of the publicly available Advanced Port Scanner tool. This .NET tool is responsible for retrieving file enumeration, registry and clipboard data. This tool contains some words in the Russian language, such as the numbers one to four. The use of such a tool indicates that the two groups might have shared a tool set or used the services of the same developers in the past. A possible – yet not confirmed – explanation for this overlap is that BianLian could be sharing a codebase with the Makop group, or using the services of the same third-party developers. This phenomenon is well-known and documented among certain underground cybercrime groups. Another noteworthy fact is that the Makop ransomware was documented excluding certain file extensions when encrypting an infected endpoint, including known extensions that are used by other ransomware strains. This is yet another indicator of possible existing relationships among these threat actors, or at least a “not stepping on someone’s toes” approach when it involves other ransomware groups. TECHNICAL ANALYSIS ATTACK LIFECYCLE We have mapped the attack stages that are common with the BianLian group to the MITRE ATT&CK framework, which is summarized below. INITIAL ACCESS To infiltrate corporate networks, BianLian operators often perform the following activities: * Use stolen Remote Desktop Protocol (RDP) credentials * Exploit the ProxyShell vulnerability * Target virtual private network (VPN) providers * Use other previously reported techniques such as deploying web shells During the last year, BianLian’s methods of infiltration and lateral movement did not change much. Nevertheless, we were able to retrieve interesting forensic data from our telemetry that provides additional behavioral indicators of compromise (IoCs). After successfully infiltrating an organization’s network, our telemetry indicates the BianLian group uses various public tools to move laterally, dump credentials and remotely execute a backdoor payload. CREDENTIAL DUMPING In our telemetry, we have witnessed dumping of the Security Accounts Manager (SAM) registry hive into a file at %windir%\Temp. This is a common technique used by attackers. The SAM stores hashed passwords from accounts used on the attacked machine, and it can be recovered when processing SYSTEM privileges. The corresponding Cortex XDR alert is shown in Figure 5. Figure 5. SAM dumping alert in Cortex XDR. PERSISTENCE During the analysis of our telemetry, we saw the attackers drop the BianLian backdoor DLL component under the following path: * c:\\programdata\\vmware\\[filename].dll. To execute the backdoor, they used the impacket tool to create the following scheduled task: cmd.exe /C rundll32.exe c:\\programdata\\vmware\\[filename].dll,Entry > C:\\Windows\\Temp\\[filename].tmp 2>&1. 1 2 3 cmd.exe /C rundll32.exe c:\\programdata\\vmware\\[filename].dll,Entry > C:\\Windows\\Temp\\[filename].tmp 2>&1. The creation of the task was detected by Cortex XDR, and the corresponding alert is shown in Figure 6 below. Figure 6. The impacket task creation alert in Cortex XDR. This task’s role is to periodically execute the backdoor DLL with its export function named Entry, using rundll32. The execution of the backdoor DLL was detected and prevented by Cortex XDR. The alert and prevention pop-up are shown in Figures 7 and 8, respectively. Figure 7. The backdoor execution detection by Cortex XDR in detect mode. Figure 8. The backdoor execution prevention by Cortex XDR in prevent mode. The backdoors themselves have different names and paths in each incident, thus making it difficult to implement naming-based behavioral detection. RECONNAISSANCE To get a better picture of an already infected network’s open ports that attackers can later use for lateral movement, the tool Advanced Port Scanner by Famatech was used from the following path: * C:\\Users\\%username%\\AppData\\Local\\Temp\\31\\Advanced_Port_Scanner_2.5.3869.exe This is the same Advanced Port Scanner file that Makop ransomware was previously documented using. The alerts raised by its execution are shown in Figure 9. Figure 9. Alerts raised by the execution of Advanced Port Scanner. ENCRYPTOR AND BACKDOOR Since the beginning of their activity, BianLian used two main components for their final payloads: an encryptor and a backdoor. Figure 10 below shows the encryptor’s ransom note. Figure 10. Example of a ransom note generated by a BianLian encryptor first seen in April 2023. In early 2023, Avast released a decryptor for BianLian's encryptor , which ultimately caused the group to cease most of its encryption activity. The threat actors then shifted their operation into a steal-and-extort scheme, mainly relying on their custom backdoor. BianLian's backdoor, similar to the encryptor, is written in Go. Its core functionality is more of a loader than a classic backdoor, with its main functionality being downloading and executing additional payloads. The backdoor contains a hard-coded C2 IP address and port to communicate with. As shown in Figures 11 and 12, Cortex XDR successfully detected the execution of the encryptor, using its anti-ransomware module and other behavioral and static detection signatures. Figure 11. BianLian encryptor detection by Cortex XDR in detect mode. Figure 12. Alerts raised by Cortex XDR detecting the BianLian encryptor in detect mode. As shown in Figure 13, when operating in prevent mode, the BianLian encryptor is prevented by Cortex XDR. Figure 13. The BianLian encryptor is prevented by Cortex XDR in prevent mode. Figures 14 and 15 below demonstrate how Cortex XDR also detected the BianLian custom backdoor in detect mode and prevented it in prevent mode. Figure 14. Cortex XDR detecting the BianLian backdoor in detect mode. Figure 15. The BianLian backdoor is prevented by Cortex XDR in prevent mode. CONCLUSION Following its discovery in 2022, the BianLian group has been one of the most active and prevalent extortion groups in the cyberthreat landscape. Out of the leak site data tracked by Unit 42 between January and mid-December of 2023, BianLian was in the top 10 of the most active groups. There is a growing list of alleged victims that they update on their leak site. Maintaining their tactics, techniques and procedures (TTPs) of infiltrating corporate networks, the BianLian group has shown adaptiveness to the ransomware market demands. They have shifted from double-extortion into being focused solely on extortion efforts, pressuring their victims into paying the ransom without encrypting their files. A possible connection to the Makop ransomware group was also found, due to their mutual use of a custom tool. PROTECTIONS AND MITIGATIONS SmartScore, a unique ML-driven scoring engine that translates security investigation methods and their associated data into a hybrid scoring system, scored an incident involving BianLian backdoor at 91 out of 100, as shown in Figure 16. This type of scoring helps analysts determine which incidents are more urgent and provides context about the reason for the assessment, assisting with prioritization. Figure 16. SmartScore information about a BianLian backdoor incident. Palo Alto Networks customers are better protected from the BianLian encryptor and backdoor components. The Cortex XDR and XSIAM platforms detect and prevent the execution flow described in the screenshots included in the previous section. The Cortex XDR agent included out of the box protections that prevented adverse behavior from the samples we tested from this group, without the need for specific detection logic or signatures. Cortex XDR and XSIAM detect user- and credential-based threats by analyzing user activity from multiple data sources including the following: * Endpoints * Network firewalls * Active Directory * Identity and access management solutions * Cloud workloads Cortex XDR and XSIAM build behavioral profiles of user activity over time with machine learning. By comparing new activity to past activity, peer activity and the expected behavior of the entity, Cortex XDR and XSIAM detect anomalous activity indicative of credential-based attacks. They also offer the following protections related to the attacks discussed in this post: * Prevent the execution of known malicious malware * Prevent execution of unknown malware using Behavioral Threat Protection and machine learning based on the Local Analysis module * Protect against credential-gathering tools and techniques using the Credential Gathering Protection, available from Cortex XDR 3.4 * Protect against exploitation of different vulnerabilities including ProxyShell using the Anti-Exploitation modules as well as Behavioral Threat Protection Cortex XDR Pro detects post-exploitation activity, including credential-based attacks, with behavioral analytics. The Prisma Cloud Defender as well as Cortex XDR for cloud agents should be deployed on cloud-based Windows virtual machines to ensure they are protected from these known malicious binaries. WildFire signatures can be used by both Palo Alto Networks cloud services to ensure cloud-based Windows virtual machine runtime operations are being analyzed and those resources are protected. Cloud-Delivered Security Services for the Next-Generation Firewall such as WildFire and Advanced URL Filtering include protections based on the IoCs shared in this article. Cortex Xpanse is also able to detect exposed RDP and many other remote access interfaces which are often brute forced or exploited with compromised credentials. This visibility can prove valuable through proactive prevention. Figure 17. A subset of the exposed remote access interface types that Cortex Xpanse can detect. If you think you might have been impacted or have an urgent matter, get in touch with the Unit 42 Incident Response team or call: * North America Toll-Free: 866.486.4842 (866.4.UNIT42) * EMEA: +31.20.299.3130 * APAC: +65.6983.8730 * Japan: +81.50.1790.0200 Palo Alto Networks has shared these findings with our fellow Cyber Threat Alliance (CTA) members. CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors. Learn more about the Cyber Threat Alliance. INDICATORS OF COMPROMISE EXAMPLES OF THE BIANLIAN ENCRYPTOR * af46356eb70f0fbb0799f8a8d5c0f7513d2f6ade4f16d4869f2690029b511d4f * 1fd42d07b4be99e0e503c0ed5af2274312be1b03e01b54a6d89c0eef04257d6e * 3a2f6e614ff030804aa18cb03fcc3bc357f6226786efb4a734cbe2a3a1984b6f * 46d340eaf6b78207e24b6011422f1a5b4a566e493d72365c6a1cace11c36b28b * 1fd07b8d1728e416f897bef4f1471126f9b18ef108eb952f4b75050da22e8e43 * eaf5e26c5e73f3db82cd07ea45e4d244ccb3ec3397ab5263a1a74add7bbcb6e2 EXAMPLES OF THE BIANLIAN BACKDOOR * c775e6d87a3bcc5e94cd055fee859bdb6350af033114fe8588d2d4d4f6d2a3ae * c57ca631b069745027d0b4f4d717821ca9bd095e28de2eafe4723eeaf4b062cf * c592194cea0acf3d3e181d2ba3108f0f86d74bcd8e49457981423f5f902d054b * df51b7b031ecc7c7fa899e17cce98b005576a20a199be670569d5e408d21048c * 2ed448721f4e92c7970972f029290ee6269689c840a922982ac2f39c9a6a838f * 264af7e7aa17422eb4299df640c1aa199b4778509697b6b296efa5ae7e957b40 * 73d095abf2f31358c8b1fb0d5a0dc9807e88d44282c896b5033c1b270d44111f * 8b65c9437445e9bcb8164d8557ecb9e3585c8bebf37099a3ec1437884efbdd24 * 4ca84be5b6ab91694a0f81350cefe8379efcad692872a383671ce4209295edc7 * 93fb7f0c2cf10fb5885e03c737ee8508816c1102e9e3d358160b78e91fa1ebdb * afb7f11da27439a2e223e6b651f96eb16a7e35b34918e501886d25439015bf78 * 53095e2ad802072e97dbb8a7ccea03a36d1536fce921c80a7a2f160c83366999 * 16cbfd155fb44c6fd0f9375376f62a90ac09f8b7689c1afb5b9b4d3e76e28bdf * 60b1394f3afee27701e2008f46d766ef466caa7711c45ddfd443a71efc39a407 * ba3c4bc99b67038b42b75a206d7ef04f6d8abaf87a76c373d4dec85e73859ce2 * e7e097723d00f58eab785baf30365c1495e99aa6ead6fe1b86109558838d294e * 96e02ea8b1c508f1ee3c1535547f9b89396f557011e61478644ae5876cdaaca5 * ac1d42360c45e0e908d07e784ceb15faf8987e4ba1744d56313de6524d2687f7 * 1cba58f73221b5bb7930bfeab0106ae5415e70f49a595727022dcf6fda1126e9 * 487f0d748a13570a46b20b6687eb7b7fc70a1a55e676fb5ff2599096a1ca888c * f84edc07b23423f2c2cad47c0600133cab3cf2bd6072ad45649d6faf3b70ec30 * 93953eef3fe8405d563560dc332135bfe5874ddeb373d714862f72ee62bef518 * f3f3c692f728b9c8fd2e1c090b60223ac6c6e88bf186c98ed9842408b78b9f3c * f6669de3baa1bca649afa55a14e30279026e59a033522877b70b74bfc000e276 * 228ef7e0a080de70652e3e0d1eab44f92f6280494c6ba98455111053701d3759 * 0e4246409cdad59e57c159c7cc4d75319edf7d197bc010174c76fe1257c3a68e * 90f50d723bf38a267f5196e22ba22584a1c84d719b501237f43d10117d972843 * 4c008ac5c07d1573a98eb87bffe64e9c9e946de63b40df3f686881cf0698eef7 * d3574cc69a5974a32a041d1dc460861fe1cef3c1f063171c5fc890ca0e8403c4 * 99fc3e13f3b4d8debf1f2328f56f3810480ee2eed9271ebf413c0015c0a54c23 * 4f4a2adc7ecc41f12defe864c78ad6bbf708355affac4115dcd5065b38198109 * 188e95d6ed0810c216ab0043ecc2f54f514e624ca31ed1eec58cfc18cc9ac75e * 16b0f643670d1f94663179815bfac493f5f30a61d15c18c8b305b1016eece7ef * c5fa6a7a3b48a2a4bbcbbbb1ca50c730f3545e3fbb03fa17fb814ad7a400a21f * d3fc56b98af9748f7b6dd44e389d343781ff47db9ed3d92ae8fadc837f25f6ed * 23295c518f194dee7815728de15bafe07bf53b52d987c7ad2b2050f833f770f7 * 06f10c935fae531e070c55bde15ee3b48b6bb289af237e96eec82124c19d1049 * 7ba40902dc495d8da28d0c0788bcfb1449818342df89f005af8ce09f2ee01798 * 3106e313f6df73b84acd8d848b467ac42c469ffabbad19e4fdcc963639cfff8c * 56e63edb832fdf08d19ecfe2de1c7c6c6581cedd431215ded0c8e44ac9aed925 * 195c11ee41f5a80d8e1b1881245545d6529671b926eb67bd3186e3ffecefe362 * ac14946fd31ca586368c774f3a3eed1620bf0f0b4f54544f5d25e87facf18d82 * 29a14cb63a1900fe185fad1c1b2f2efb85a058ac3c185948b758f3ce4107e11e * 91ffe0ee445b82bd3360156feeecf8112d27c9333f9796caffcfda986fd7e9b4 * 5162fd73cbe8f313d2b0e4180bab4cbe47185f73a3ffc3d1dcccc36bc2865142 * 7dabe5d40c13c7c342b7182eaf7c63fbb5e326300316f6f6518b527d57e79ac8 * 4e92b73a17e0646876fb9be09c4ee6f015f00273932d2422b69339e22b78b385 * 9413ba4a33ea77326b837ba538f92348e1909d5263ca67a86aa327daa8fbba30 * bd41ac2686beadc1cb008433960317b648caae37c93d8c0d61ad40fe27b5b67e * bd57af28c94c3b7f156511c48f4b62cd1b4c29a1a693f4dc831e0a928691cc56 ADVANCED PORT SCANNER * d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb .NET TOOL * 40126ae71b857dd22db39611c25d3d5dd0e60316b72830e930fba9baf23973ce BIANLIAN COMMAND AND CONTROL SERVERS * 208.123.119[.]123 * 13.215.228[.]73 * 54.193.91[.]232 * 172.96.137[.]159 * 204.152.203[.]90 * 144.208.127[.]119 * 192.161.48[.]43 * 146.70.87[.]197 * 45.86.230[.]64 * 45.56.165[.]17 * 23.163.0[.]168 * 172.96.137[.]249 * 173.254.204[.]78 * 185.56.137[.]117 * 52.87.206[.]242 * 45.66.249[.]118 * 96.44.157[.]203 * 103.20.235[.]122 * 44.212.9[.]14 * 149.154.158[.]154 * 146.59.102[.]74 * 96.44.135[.]76 * 85.239.52[.]96 * 66.85.156[.]83 * 198.252.98[.]186 * 3.236.161[.]7 * 13.59.168[.]154 * 172.245.128[.]35 * 216.146.25[.]60 * 172.86.122[.]183 * 185.99.133[.]112 * 149.154.158[.]214 * 104.200.72[.]6 * 23.163.0[.]228 ADDITIONAL RESOURCES * BianLian ransomware gang holds Save the Children hostage – Computer Weekly, by TechTarget * #StopRansomware: BianLian Ransomware Group – U.S. Cybersecurity and Infrastructure Security Agency (CISA) * BianLian Ransomware Gang Gives It a Go! – Redacted * BianLian Ransomware Gang Continues to Evolve – Redacted * Makop: The Toolkit of a Criminal Gang – L M, Medium * Makop Ransomware Whitepaper – LIFARS by SecurityScorecard * BianLian Ransomware Lists St Rose Hospital as Victim – The Cyber Express * Decrypted: BianLian Ransomware – Avast Threat Labs * OS Credential Dumping: Security Account Manager, Sub-technique T1003.002 - Enterprise – MITRE ATT&CK Back to top TAGS * BianLian * Bitter Scorpius * Makop Threat Research Center Next: Parrot TDS: A Persistent and Evolving Malware Campaign TABLE OF CONTENTS * * Executive Summary * BianLian Threat Overview * Possible Connection to Makop Ransomware * Technical Analysis * Attack Lifecycle * Initial Access * Credential Dumping * Persistence * Reconnaissance * Encryptor and Backdoor * Conclusion * Protections and Mitigations * Indicators of Compromise * Examples of the BianLian Encryptor * Examples of the BianLian Backdoor * Advanced Port Scanner * .NET Tool * BianLian Command and Control Servers * Additional Resources RELATED ARTICLES * Beware of BadPack: One Weird Trick Being Used Against Android Devices * Threat Actor Groups Tracked by Palo Alto Networks Unit 42 RELATED RESOURCES Threat Research July 10, 2024 DARKGATE: DANCING THE SAMBA WITH ALLURING EXCEL FILES * Sandbox * Microsoft Excel * Malware-as-a-service Read now Threat Actor Groups June 27, 2024 THREAT ACTOR GROUPS TRACKED BY PALO ALTO NETWORKS UNIT 42 * Academic Serpens * Agent Serpens * Agonizing Serpens Read now Threat Research May 16, 2024 PAYLOAD TRENDS IN MALICIOUS ONENOTE SAMPLES * Malvertising * Microsoft OneNote * Phishing Read now Threat Actor Groups October 30, 2024 JUMPY PISCES ENGAGES IN PLAY RANSOMWARE * North Korea * Jumpy Pisces * Fiddling Scorpius Read now High Profile Threats October 10, 2024 LYNX RANSOMWARE: A REBRANDING OF INC RANSOMWARE * Leak site * Double extortion Read now High Profile Threats September 10, 2024 THREAT ASSESSMENT: REPELLENT SCORPIUS, DISTRIBUTORS OF CICADA3301 RANSOMWARE * RaaS * Data exfiltration * Leak site Read now High Profile Threats September 9, 2024 THREAT ASSESSMENT: NORTH KOREAN THREAT GROUPS * North Korea * Remote Access Trojan * Finance Read now Threat Actor Groups August 23, 2024 BLING LIBRA’S TACTICAL EVOLUTION: THE THREAT ACTOR GROUP BEHIND SHINYHUNTERS RANSOMWARE * MITRE * Extortion * Container Read now Trend Reports August 9, 2024 RANSOMWARE REVIEW: FIRST HALF OF 2024 * Healthcare * LockBit * RansomHub Read now Threat Research July 22, 2024 FROM RA GROUP TO RA WORLD: EVOLUTION OF A RANSOMWARE GROUP * Extortion * Leak site * Babuk Read now Threat Research July 10, 2024 DARKGATE: DANCING THE SAMBA WITH ALLURING EXCEL FILES * Sandbox * Microsoft Excel * Malware-as-a-service Read now Threat Actor Groups June 27, 2024 THREAT ACTOR GROUPS TRACKED BY PALO ALTO NETWORKS UNIT 42 * Academic Serpens * Agent Serpens * Agonizing Serpens Read now Threat Research May 16, 2024 PAYLOAD TRENDS IN MALICIOUS ONENOTE SAMPLES * Malvertising * Microsoft OneNote * Phishing Read now Threat Actor Groups October 30, 2024 JUMPY PISCES ENGAGES IN PLAY RANSOMWARE * North Korea * Jumpy Pisces * Fiddling Scorpius Read now High Profile Threats October 10, 2024 LYNX RANSOMWARE: A REBRANDING OF INC RANSOMWARE * Leak site * Double extortion Read now High Profile Threats September 10, 2024 THREAT ASSESSMENT: REPELLENT SCORPIUS, DISTRIBUTORS OF CICADA3301 RANSOMWARE * RaaS * Data exfiltration * Leak site Read now High Profile Threats September 9, 2024 THREAT ASSESSMENT: NORTH KOREAN THREAT GROUPS * North Korea * Remote Access Trojan * Finance Read now Threat Actor Groups August 23, 2024 BLING LIBRA’S TACTICAL EVOLUTION: THE THREAT ACTOR GROUP BEHIND SHINYHUNTERS RANSOMWARE * MITRE * Extortion * Container Read now Trend Reports August 9, 2024 RANSOMWARE REVIEW: FIRST HALF OF 2024 * Healthcare * LockBit * RansomHub Read now Threat Research July 22, 2024 FROM RA GROUP TO RA WORLD: EVOLUTION OF A RANSOMWARE GROUP * Extortion * Leak site * Babuk Read now Threat Research July 10, 2024 DARKGATE: DANCING THE SAMBA WITH ALLURING EXCEL FILES * Sandbox * Microsoft Excel * Malware-as-a-service Read now Threat Actor Groups June 27, 2024 THREAT ACTOR GROUPS TRACKED BY PALO ALTO NETWORKS UNIT 42 * Academic Serpens * Agent Serpens * Agonizing Serpens Read now Threat Research May 16, 2024 PAYLOAD TRENDS IN MALICIOUS ONENOTE SAMPLES * Malvertising * Microsoft OneNote * Phishing Read now * * Get updates from Unit 42 PEACE OF MIND COMES FROM STAYING AHEAD OF THREATS. CONTACT US TODAY. Your Email Subscribe for email updates to all Unit 42 threat research. By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Invalid captcha! Subscribe PRODUCTS AND SERVICES * Network Security Platform * CLOUD DELIVERED SECURITY SERVICES * Advanced Threat Prevention * DNS Security * Data Loss Prevention * IoT Security * Next-Generation Firewalls * Hardware Firewalls * Strata Cloud Manager * SECURE ACCESS SERVICE EDGE * Prisma Access * Prisma SD-WAN * Autonomous Digital Experience Management * Cloud Access Security Broker * Zero Trust Network Access * Code to Cloud Platform * Prisma Cloud * Cloud-Native Application Protection Platform * AI-Driven Security Operations Platform * Cortex XDR * Cortex XSOAR * Cortex Xpanse * Cortex XSIAM * External Attack Surface Protection * Security Automation * Threat Prevention, Detection & Response * Threat Intel and Incident Response Services * Proactive Assessments * Incident Response * Transform Your Security Strategy * Discover Threat Intelligence COMPANY * About Us * Careers * Contact Us * Corporate Responsibility * Customers * Investor Relations * Location * Newsroom POPULAR LINKS * Blog * Communities * Content Library * Cyberpedia * Event Center * Manage Email Preferences * Products A-Z * Product Certifications * Report a Vulnerability * Sitemap * Tech Docs * Unit 42 * Do Not Sell or Share My Personal Information * Privacy * Trust Center * Terms of Use * Documents Copyright © 2024 Palo Alto Networks. All Rights Reserved * * * * * EN * Select your language * USA (ENGLISH) * JAPAN (日本語) Your browser does not support the video tag. DEFAULT HEADING Read the article Seekbar Volume This site uses cookies essential to its operation, for analytics, and for personalized content and ads. Please read our privacy statement for more information.Privacy statement Cookies Settings Reject All Accept All Your Opt Out Preference Signal is Honored PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information on cookie consent Allow All MANAGE YOUR CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices