BianLian attacks ATS Infrastructure
The BianLian Ransomware Gang Attacks ATS Infrastructure
The BianLian ransomware gang has attacked ATS Infrastructure. ATS Infrastructure is a leading real estate development company in India. Established in 1998, the company continues to be at the forefront of delivering exceptional residential, commercial, and hospitality projects across various cities. ATS Infrastructure's primary focus lies in creating premium residential developments that meet the demands of contemporary home buyers. Their projects include luxury apartments, villas, and penthouses, distinguished by modern amenities and top-notch construction quality.
In addition to residential properties, ATS Infrastructure engages in commercial projects, developing office spaces and retail complexes catering to the evolving business landscape. BianLian posted ATS Infrastructure to its data leak site on July 14th, threatening to publish all stolen data by July 22nd if the organization fails to comply.
About BianLian
BianLian is an infamous cybercriminal organization involved in the development and deployment of ransomware. Since June 2022, they have targeted various critical infrastructure sectors in the United States. Additionally, they have extended their attacks to include Australian critical infrastructure sectors, professional services, and property development domains.
The group exploits valid Remote Desktop Protocol (RDP) credentials to gain unauthorized access to their victims' systems. They employ open-source tools and command-line scripts to carry out reconnaissance and gather credentials. Victim data is then extracted using File Transfer Protocol (FTP), Rclone, or Mega. Subsequently, the BianLian group proceeds to extort money from their victims by threatening to expose the obtained data unless a payment is made.
Initially, the group utilized a double-extortion approach, which involved encrypting victims' systems after data exfiltration. However, starting around January 2023, they primarily focused on data exfiltration-based extortion.
Disclaimer
The Halcyon Attacks Lookout Database is compiled using publicly available information based on the hosting choices of real-world threat actors and data from a variety of trackers. This information is provided in accordance with principles of fair use. Halcyon has made reasonable efforts to sanitize and verify the data; however, we do not guarantee the accuracy, completeness, or reliability of the information provided. Updates to the database are made as new source data becomes available from reputable sources. By accessing, viewing, or using the information within the Halcyon Attacks Lookout Database, you acknowledge and agree to do so entirely at your own risk. No reliance should be placed upon the information for decision-making, and Halcyon disclaims all liability for any inaccuracies or omissions in the data.
See Halcyon in action
Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!