BianLian ransomware gang has been noted by a joint advisory from the FBI, Cybersecurity and Infrastructure Security Agency, and Australia's Cyber Security Centre to have changed up its operations to leverage exfiltration-based extortion rather than ransomware encryption it initially used since its emergence two years ago, SiliconAngle reports.
Various critical infrastructure entities and other organizations in the U.S., UK, and Australia have been compromised by BianLian last year through the use of valid Remote Desktop Protocol credentials and open-source tools, which facilitated data exfiltration efforts.
Organizations have been urged by the joint advisory to adopt security measures to better protect themselves from the threat of BianLian ransomware, including the implementation of remote access tool audits and remote access detection software.
Meanwhile, Halcyon Tech CEO Jon Miller noted that BianLian's transition indicates the high level of success for double extortion.
"It works so well that we will likely see more groups follow suit and forego the hassle of developing and managing the encryption and decryption process in favor of a less complicated attack," Miller added.
Officials at the City of Augusta, Georgia, have been noted by Mayor Garnett Johnson to have not communicated with the BlackByte ransomware operation that took credit for a cyberattack against the city that commenced on May 21, according to The Record, a news site by cybersecurity firm Recorded Future.
Attacks exploiting a zero-day in the MOVEit Transfer file transfer app to compromise various servers and facilitate data exfiltration efforts have been admitted by the Clop ransomware operation, also known as Lace Tempest, TA505, and FIN11, after the intrusions have been attributed to the group by Microsoft, reports BleepingComputer.
University of Waterloo in Canada has disclosed that its on-campus Microsoft Exchange servers have been impacted by an averted ransomware attack on May 30, according to The Record, a news site by cybersecurity firm Recorded Future.