Cyber Security News

Ransomware Gangs Are Collaborating To Attack Financial Services Firms

The Cyber-Extortion Trinity—the BianLian, White Rabbit, and Mario ransomware gangs—was observed by researchers working together to launch a joint extortion campaign against publicly traded financial services companies.

Although these joint ransomware attacks are uncommon, they may grow more often due to Initial Access Brokers (IABs) working with various Dark Web groups.

Law enforcement actions that establish networks of cybercriminals are another aspect that might be encouraging more cooperation. Members of these threat actor networks who have been displaced might be more open to working with competitors.

Resecurity, Inc. (USA) has found this significant connection between three main ransomware gangs based on a recent Digital Forensics & Incident Response (DFIR) engagement with a law enforcement agency (LEA) and one of the top investment firms in Singapore.

Overview of BianLian, White Rabbit, and Mario Ransomware Gangs

After attacking a U.S. bank in December 2021, the White Rabbit ransomware family was first observed in the wild, focusing on financial institutions (FIs).

Giving victims four or five days to pay their ransom was a strategy that the threat actors behind White Rabbit initially adopted. This ransom family’s note threatens to report victims to oversight authorities, putting businesses at risk of fines and General Data Protection Regulation (GDPR) enforcement if they don’t pay the extortion money on time.

Notably, the Ransomhouse Telegram Channel has always been mentioned in White Rabbit’s ransomware note.

2022 White Rabbit ransom note

According to the CISA-ACSC advisory, Since June 2022, companies in several crucial infrastructure sectors in the United States have been the target of BianLian, a cybercriminal group that develops, deploys, and demands data using ransomware.

They have targeted professional services, property development, and Australia’s essential infrastructure sectors.

Using legitimate Remote Desktop Protocol (RDP) credentials, BianLian acquires access to victim systems, performs credential harvesting and discovery using open-source tools and command-line scripting, and exfiltrates victim data via File Transfer Protocol (FTP), Rclone, or Mega.

Actors from the BianLian organization then threatened to release data to extract money. The BianLian group used a double-extortion methodology in which they first encrypted the victims’ systems after exfiltrating the data.

BianLian Ransomware Dark Web Page Releasing Victim Information

MarioLocker is a ransomware-type malware. People whose computers are infected with this kind of malicious software typically aren’t able to view or use their files.

Subsequent analysis revealed that additional ransomware notes bearing a signature linked to the Mario ransomware were found on a number of the victim’s compromised computers. The note included a clear reference to the RansomHouse Telegram Channel.

Italian Mario Ransomware note

Hence, the current dynamic ransomware threat landscape poses a significant challenge for organizations, and this instance highlights the vital significance of proactive cybersecurity strategy and planning.

Regular system updates, strong threat detection systems, and employee training to assist staff in recognizing and preventing social engineering attacks are recommended.

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands

ChaosBot surfaced in late September 2025 as a sophisticated Rust-based backdoor targeting enterprise networks. Initial…

15 hours ago

Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware

Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances…

15 hours ago

Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture

Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native…

16 hours ago

175 Malicious npm Packages With 26,000 Downloads Attacking Technology, and Energy Companies Worldwide

Socket's Threat Research Team has uncovered a sophisticated phishing campaign involving 175 malicious npm packages…

17 hours ago

RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers

Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive…

17 hours ago

Microsoft Defender Incorrectly Flags SQL Server Software as End-of-life

Microsoft Defender for Endpoint is incorrectly flagging specific versions of SQL Server as having reached…

19 hours ago