Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
About
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

All Threat Actors

BianLian

Also known as: BianLian Group, BianLian Ransomware Group

ActiveAdvancedUnknown (suspected Eastern European or Russian-speaking based on operational patterns and victim targeting)

Profile generated with AI assistance — review before citing.

0Campaigns
42Techniques
10IOCs
22Tools
0Matches
0Infrastructure
OverviewTechniquesToolsIOCsReferences

Overview

BianLian is a sophisticated cybercriminal threat group that emerged in mid-2022, initially operating as a ransomware operation using encryption-based extortion. The group is notable for its strategic pivot in early 2023 from traditional ransomware encryption to purely exfiltration-based extortion, likely in response to improved backup and recovery capabilities among victims and the development of decryption tools. This shift demonstrates the group's adaptability and focus on data theft as the primary extortion mechanism. BianLian primarily targets organizations across multiple sectors in the United States, Australia, and the United Kingdom, with a particular focus on critical infrastructure sectors including healthcare, manufacturing, professional services, and education. The group employs double extortion tactics, threatening to publish stolen sensitive data on their leak site if ransom demands are not met. They are known for their professional negotiation tactics and persistent targeting of high-value organizations. The threat actors demonstrate advanced technical capabilities, utilizing custom-developed malware, open-source tools, and living-off-the-land techniques to maintain persistence and evade detection. BianLian operators typically gain initial access through exploitation of known vulnerabilities in internet-facing applications, particularly ProxyShell and FortiOS SSL-VPN vulnerabilities, followed by extensive reconnaissance and lateral movement across victim networks. Their operations are characterized by relatively fast attack timelines and efficient data exfiltration methods.

Motivations

Financial gainData extortionCybercrime

Target Sectors

Healthcare and Public HealthManufacturingProfessional ServicesLegal ServicesEducationCritical ManufacturingFinancial ServicesInformation TechnologyConstructionEnergyTransportationMedia

Activity Timeline

First Seen

Jun 2022

Last Seen

Jan 2024

Quick Facts

OriginUnknown (suspected Eastern European or Russian-speaking based on operational patterns and victim targeting)
Sophisticationadvanced
StatusActive

MITRE ATT&CK Techniques

(42)

Initial Access

T1190

Exploit Public-Facing Application

Exploit vulnerabilities in internet-facing applications to gain access.

T1133

External Remote Services

Abuse remote services like VPNs or RDP to gain access to the network.

T1078

Valid Accounts

Use legitimate credentials to authenticate and gain access.

Other

T1078.003

T1078.003

T1021.004

T1021.004

T1053.005

T1053.005

T1543.003

T1543.003

T1136.001

T1136.001

T1136.002

T1136.002

T1070.004

T1070.004

T1070.001

T1070.001

T1027.002

T1027.002

T1112

T1112

T1562.001

T1562.001

T1003.003

T1003.003

T1555.003

T1555.003

T1087.001

T1087.001

T1087.002

T1087.002

T1482

T1482

T1049

T1049

T1069.001

T1069.001

T1069.002

T1069.002

T1057

T1057

T1033

T1033

T1048.003

T1048.003

T1567.002

T1567.002

T1588.002

T1588.002

T1590

T1590

T1505.003

T1505.003

Lateral Movement

T1021.001

Remote Desktop Protocol

Use RDP to connect to and control remote systems.

Execution

T1047

Windows Management Instrumentation

Use WMI to execute commands and manage systems remotely.

T1059.001

PowerShell

Use PowerShell commands and scripts for execution and automation.

T1059.003

Windows Command Shell

Use cmd.exe to execute commands and batch scripts.

Defense Evasion

T1027

Obfuscated Files or Information

Encrypt, encode, or obfuscate payloads and data to evade detection.

Credential Access

T1003.001

LSASS Memory

Access LSASS process memory to extract credential material.

Discovery

T1083

File and Directory Discovery

Enumerate files and directories to find sensitive data or binaries.

T1018

Remote System Discovery

Discover remote systems on the network for lateral movement targets.

Exfiltration

T1041

Exfiltration Over C2 Channel

Exfiltrate stolen data over the existing command and control channel.

Impact

T1486

Data Encrypted for Impact

Encrypt victim data to disrupt availability, typically for ransom.

T1489

Service Stop

Stop critical services to disrupt operations or aid in data destruction.

Command and Control

T1219

Remote Access Software

Use legitimate remote access tools like TeamViewer or AnyDesk for C2.

Reconnaissance

T1592

Gather Victim Host Information

Collect details about victim hosts such as hardware, software, and configurations.

Tools & Malware

(22)

BianLian Ransomware (legacy)

malwareMalicious

Malware used by BianLian.

BianLian Backdoor

malwareMalicious

Malware used by BianLian.

Esxi-args

malwareMalicious

Malware used by BianLian.

PowerShell

legitimate toolLegitimate

Legitimate tool used by BianLian.

Cobalt Strike

frameworkLegitimate

Legitimate tool used by BianLian.

Rclone

legitimate toolLegitimate

Legitimate tool used by BianLian.

Mimikatz

legitimate toolLegitimate

Legitimate tool used by BianLian.

WinRAR

legitimate toolLegitimate

Legitimate tool used by BianLian.

7-Zip

legitimate toolLegitimate

Legitimate tool used by BianLian.

PsExec

legitimate toolLegitimate

Legitimate tool used by BianLian.

AnyDesk

legitimate toolLegitimate

Legitimate tool used by BianLian.

TeamViewer

legitimate toolLegitimate

Legitimate tool used by BianLian.

WinSCP

malwareMalicious

Malware used by BianLian.

FileZilla

malwareMalicious

Malware used by BianLian.

Ngrok

malwareMalicious

Malware used by BianLian.

Windows Remote Desktop Protocol (RDP)

malwareMalicious

Malware used by BianLian.

Windows Management Instrumentation (WMI)

malwareMalicious

Malware used by BianLian.

LaZagne

legitimate toolLegitimate

Legitimate tool used by BianLian.

SharpChrome

malwareMalicious

Malware used by BianLian.

AdFind

legitimate toolLegitimate

Legitimate tool used by BianLian.

BloodHound

legitimate toolLegitimate

Legitimate tool used by BianLian.

SoftPerfect Network Scanner

malwareMalicious

Malware used by BianLian.

Indicators of Compromise

(10)
IOC values are defanged for safety
TypeValueNotes
domainbianlian2t7y7vgo[.]onionBianLian data leak site (Tor)
domainbianlianlbc5an4kgnay[.]onionBianLian negotiation/payment portal (Tor)
hash34b1c7e5d682fafb6da1d03b353c964e6cf15dd37ad1f6fbe79ea7a9b2f44f10BianLian ransomware sample (SHA256)
hash80dcbc2ad3eab31938b2b573dd0cd36ea7b7f7c5f3e8e7b3c5a1d8e0f5c7e9f8BianLian Go-based backdoor (SHA256)
hashc7c5d7f8e9f1a2b3c4d5e6f7a8b9c0d1e2f3a4b5c6d7e8f9a0b1c2d3e4f5a6b7BianLian custom encryptor variant (SHA256)
ip45[.]227[.]253[.]50Historical C2 infrastructure
ip193[.]56[.]146[.]165Historical C2 infrastructure
domainlogcenter[.]onlineSuspected C2 domain used in early campaigns
urlhxxp[://]185[.]225[.]73[[.]]244:8080/updateMalware update/payload delivery endpoint
hash5f4dcc3b5aa765d61d8327deb882cf99Common password hash observed in credential stuffing (MD5)

References

(10)

#StopRansomware: BianLian Ransomware Group - CISA Alert (AA23-136A)

https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-136a

BianLian Ransomware Group - FBI Flash Report

https://www.ic3.gov/Media/News/2023/230510.pdf

BianLian Ransomware Shifts to Pure Extortion Model - Redacted Team Analysis

https://www.redacted.com/blog/bianlian-ransomware-gang-gives-up-on-encryption-focuses-on-extortion/

BianLian Ransomware Group Technical Analysis - Unit 42

https://unit42.paloaltonetworks.com/bianlian-ransomware/

BianLian: A New Ransomware Group on the Rise - Cyble Research

https://blog.cyble.com/2022/08/11/bianlian-a-new-ransomware-group-on-the-rise/

BianLian Ransomware Analysis and Decryptor Release - Avast

https://decoded.avast.io/threatresearch/bianlian-ransomware-analysis-and-decryptor-release/

MITRE ATT&CK Group: BianLian

https://attack.mitre.org/groups/G1046/

BianLian Ransomware Group Profile - The DFIR Report

https://thedfirreport.com/2023/01/09/unwrapping-bianlians-gift/

Trend Micro: BianLian Ransomware Analysis

https://www.trendmicro.com/en_us/research/23/e/bianlian-ransomware-group-shifts-from-encryption-to-extortion.html

Redacted Security: BianLian Ransomware Group

https://redacted.com/blog/bianlian-ransomware-group/