Under the radar - Google warns new Brickstorm malware was stealing data from
US firms for over a year
Date:
Thu, 25 Sep 2025 17:05:00 +0000
Description:
Chinese state-sponsored actors are at it again targeting legal, SaaS, and government agencies.
FULL STORY
US organizations across the legal, technology, SaaS, and business process outsourcing sectors were targeted by a new malware variant named Brickstorm
for over a year, leading to major data loss, experts have warned.
Googles Threat Intelligence Group (GTIG) found the threat actors behind the campaign are UNC5221, a suspected China-nexus threat known for stealthy operations and long-term persistence.
This group first targeted zero-day vulnerabilities in Linux devices and BSD-based appliances, since these are often overlooked in asset inventories
and excluded from central logging. As such, they make for an ideal foothold
for the attackers.
Cyber-espionage
Once inside, UNC5221 used Brickstorm to move laterally, harvest credentials, and exfiltrate data with minimal telemetry. In some cases, the malware
remained undetected for more than a year, since the average dwell time was
said to be a mighty 393 days.
In many cases, they would pivot from fringe devices to VMware vCenter and
ESXi hosts, using stolen credentials to deploy Brickstorm and escalate privileges.
To maintain persistence, they modified startup scripts and deployed webshells that allowed for remote command execution. They cloned sensitive virtual machines without even powering them on, and thus avoiding triggering security tools.
The campaigns objectives appear to span geopolitical espionage, intellectual property theft, and access operations.
Since legal companies were targeted as well, the researchers suspected
UNC5221 was interested in US national security, and trade topics, while targeting SaaS providers could have been used to pivot into downstream
customer environments.
To counter Brickstorm, Mandiant recommends a threat-hunting approach based on tactics, techniques, and procedures (TTPs) rather than atomic indicators,
which have proven unreliable due to the actors operational discipline.
The researchers urged businesses to update asset inventories, monitor
appliance traffic, and enforce multi-factor authentication .
======================================================================
Link to news story:
https://www.techradar.com/pro/security/under-the-radar-google-warns-new-bricks torm-malware-was-stealing-data-from-us-firms-for-over-a-year
$$
--- SBBSecho 3.28-Linux
* Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)