BianLian Data Extortion Group – Updated Advisory

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) have released a joint Cybersecurity Advisory detailing the tactics, techniques, and procedures (TTPs) of the BianLian…

DALL·E 2024-11-21 09.08.14 - A dark and ominous illustration representing the BianLian ransomware group. The image features a digital skull with circuit-like patterns glowing in r

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) have released a joint Cybersecurity Advisory detailing the tactics, techniques, and procedures (TTPs) of the BianLian ransomware and data extortion group. This advisory, updated as of November 20, 2024, provides critical insights into the group's operations and offers recommendations to mitigate associated risks.

Executive Summary

BianLian is a cybercriminal group specializing in ransomware development, deployment, and data extortion. Active since June 2022, they have targeted multiple U.S. critical infrastructure sectors and Australian organizations, including professional services and property development. Initially employing a double-extortion model—encrypting systems and exfiltrating data—they shifted to primarily exfiltration-based extortion by January 2023 and exclusively to this method by January 2024. Their operations involve exploiting Remote Desktop Protocol (RDP) credentials, utilizing open-source tools for system discovery and credential harvesting, and exfiltrating data via protocols like FTP, Rclone, or Mega. The group threatens to release sensitive data if ransom demands are unmet.

 

Full Technical Analysis

Initial Access

  • Credential-Based Access: BianLian primarily exploits stolen RDP credentials obtained through initial access brokers or via targeted phishing campaigns.
  • Public-Facing Vulnerabilities: Exploits include known vulnerabilities in Windows and ESXi systems. Specifically, they likely leverage the ProxyShell vulnerability chain (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) to compromise Exchange servers.
  • TTP Evolution: Adapted initial access vectors and delivery mechanisms align with observed trends in exploit targeting across critical infrastructure and enterprise systems.

Command and Control (C2)

  • C2 Mechanisms: Utilizes persistent backdoors and open-source tools for maintaining access and executing commands.
  • Reconnaissance: Performs thorough internal network discovery using utilities like PowerShell, WMI, and built-in administrative tools to map the environment and identify high-value systems.
  • Credential Harvesting: Deploys tools such as Mimikatz to extract credentials from memory, enabling lateral movement and privilege escalation.

Lateral Movement and Privilege Escalation

  • Toolset:
    • PowerShell for executing commands and file transfers.
    • Native Windows utilities, including tasklist, netstat, and ipconfig, for network and process enumeration.
  • Custom and Open-Source Payloads: Leveraged for evasion and privilege escalation, often obfuscated to bypass detection mechanisms.

Data Exfiltration

  • Exfiltration Mechanisms: Data is extracted using a mix of:
    • FTP for direct file transfers.
    • Rclone for synchronizing data with cloud storage.
    • Mega for encrypted data storage and retrieval.
  • Data Prioritization: Focuses on sensitive corporate data, financial records, and intellectual property to maximize leverage in extortion campaigns.

Extortion Model

  • Shift to Exfiltration-Based Extortion: By early 2024, BianLian fully abandoned encryption and focused exclusively on data exfiltration. This change reduces their operational footprint while enhancing their ability to monetize stolen data.
  • Public Disclosure Threats: Leverages dark web and public leak sites to pressure victims into paying ransoms.

 

MITRE ATT&CK Tactics and Techniques

Attack patterns kill chain

Technical Recommendations

  1. Harden Remote Access
    • Restrict RDP to authorized IP ranges.
    • Enforce multi-factor authentication (MFA) for all remote connections.
    • Monitor RDP login attempts for anomalies (e.g., geographic irregularities, repeated failed attempts).
  2. Patch and Vulnerability Management
    • Apply patches to address vulnerabilities, especially ProxyShell-related CVEs on Exchange servers and vulnerabilities in ESXi infrastructure.
    • Employ vulnerability scanning tools (e.g., Nessus, Qualys) to identify and prioritize remediation of high-risk exposures.
  3. Restrict Lateral Movement
    • Implement network segmentation to isolate sensitive systems.
    • Disable or restrict the use of PowerShell and WMI for non-administrative accounts.
    • Use endpoint detection and response (EDR) solutions to identify suspicious lateral movement.
  4. Enhance Data Protection
    • Monitor outbound network traffic for unusual volumes or destinations (e.g., FTP, Rclone, Mega).
    • Implement Data Loss Prevention (DLP) solutions to detect and block unauthorized data exfiltration attempts.
  5. Credential Security
    • Use privileged access management (PAM) tools to limit access to sensitive accounts.
    • Regularly rotate passwords for service accounts and high-privilege users.
    • Audit systems for cached or plaintext credentials that could be targeted by tools like Mimikatz.
  6. Incident Response Preparation
    • Develop a forensic analysis plan to quickly identify compromised accounts, exploited vulnerabilities, and exfiltration paths.
    • Test backup restoration processes regularly to ensure data integrity in the event of an attack.
    • Simulate ransomware and exfiltration scenarios to validate response readiness.
  7. Advanced Threat Hunting
    • Look for TTP indicators such as unexpected use of rclone.exe, abnormal PowerShell script execution, and file transfers to Mega endpoints.
    • Deploy honeypots or deception technology to attract and detect attackers attempting lateral movement.
  8. Network Traffic Analysis
    • Use intrusion detection systems (IDS) and network monitoring tools to flag anomalous traffic patterns.
    • Regularly review logs for connections to known C2 domains or IPs associated with ransomware operators.

By implementing these technical controls and adopting a proactive, layered defense strategy, organizations can significantly reduce their exposure to BianLian’s evolving tactics and techniques.

RELATED

Are You Using M365 Co-pilot? Beware of Missing Logs and Hidden Costs

By Eric Taylor | November 12, 2024

Leveraging M365 Co-pilot’s AI capabilities can be transformative for organizations, but recent insights underscore that logging and auditing around Co-pilot…

RTM – Remote Monitoring & Management (RMM) Tools

By Eric Taylor | September 10, 2024

Topic: Ransomware Tool Matrix Focus: Remote Monitoring & Management (RMM) Tools An RMM (Remote Monitoring and Management) tool is a…

REMCOS Remote Control & Surveillance Software

By Eric Taylor | August 21, 2024
,

What Is Remcos? aka: RemcosRAT, Remvio, Socmer Actor(s): APT33, The Gorgon Group, UAC-0050 Remcos (short for Remote Control and Surveillance) is a commercial…