Classifications & Affiliations
Type: Closed Group | Data Extortion Only
BianLian maintained centralized control without affiliate infrastructure or revenue sharing. Following the release of a public decryptor in late 2023, the group transitioned from traditional ransomware to data exfiltration only. This private group model enabled direct victim engagement through aggressive tactics including printer hijacking and threatening phone calls. Confirmed Russian origins with infrastructure dependencies on sanctioned hosting provider Aeza Group distinguished the operation, while proprietary Go-coded tools and custom backdoors demonstrated internal development capabilities absent from traditional RaaS operations.
Current Status: Last claimed an attack in March 2025