mor3intel logo
mor3intelThreat Intelligence
DashboardVictimsGroupsCountriesStatsATT&CKRulesIOC Lookup
InstagramTelegram
5 Active Threats
Back to Dashboard

BianLian

active

Also known as: BianLian Ransomware

BianLian is a ransomware group written in Go that shifted from encryption-based attacks to pure data extortion in early 2023 after a decryptor was released. They focus on exfiltrating data and threatening publication.

First Seen

2022-06

Last Activity

2025-01

Target Regions

3 regions

Industries

5 sectors

HealthcareProfessional ServicesManufacturingEducationMedia
Attack Chain (MITRE ATT&CK)
Visual representation of the attack phases and techniques used by BianLian

Click on a phase to view details and MITRE ATT&CK technique IDs

Tactics & Techniques
MITRE ATT&CK mapped tactics and techniques used by this threat actor
Technique IDNameTacticDescriptionReference
T1078Valid AccountsInitial AccessUses compromised RDP credentialsMITRE
T1657Financial TheftImpactPure extortion model threatening data publicationMITRE
Indicators of Compromise (IOCs)
Known IOCs associated with BianLian operations
TypeValueDescriptionLast SeenActions
hashb8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3f4a5b6c7d8e9f0a1b2c3d4e5f6a7b8c9BianLian Go-based backdoor2025-01-08
domainbianlianxxxxxxx[.]onionTor leak site—

IOCs are defanged for safety. Click copy to get the clean value.

Detection Guidance
SIEM and EDR detection recommendations for identifying BianLian activity
  • 1
    Monitor for rclone execution
  • 2
    Detect mega.io upload activity
  • 3
    Alert on unusual RDP access patterns
  • 4
    Monitor for Go-based process execution
Mitigation, Containment & Recovery
Step-by-step guidance for responding to and recovering from this ransomware attack
  • 1
    Audit RDP access and credentials
  • 2
    Block data exfil to cloud storage
  • 3
    Isolate compromised systems
mor3intel logomor3intel

This platform is intended for defensive cybersecurity, incident response, and recovery purposes only. Information provided is for educational and defensive use.

@mor3cod3@mor3cod3
© 2026 mor3intel