CISA, NSA Warn of Chinese BRICKSTORM Malware Targeting Government and IT Sectors

CISA, NSA Warn of Chinese BRICKSTORM Malware Targeting Government and IT Sectors

CISA, the NSA, and the Canadian Centre for Cyber Security have issued a joint malware analysis report warning that Chinese state-sponsored actors are using BRICKSTORM, a sophisticated backdoor designed for long-term persistence in VMware vSphere and Windows environments.

The advisory, first published in December 2025 and updated with additional samples, provides indicators of compromise (IOCs) and detection signatures based on analysis of 11 BRICKSTORM samples obtained from victim organizations.

Targets and Impact

Victim organizations are primarily in the Government Services and Facilities and Information Technology sectors. In one incident where CISA conducted an incident response engagement, PRC actors maintained persistent access from April 2024 through at least September 2025—over 17 months of undetected presence.

"These state-sponsored actors are not just infiltrating networks—they are embedding themselves to enable long-term access, disruption, and potential sabotage," said CISA Acting Director Madhu Gottumukkala.

CrowdStrike, which tracks the threat actor as Warp Panda, reported seeing "multiple intrusions targeting VMware vCenter environments at U.S.-based entities" throughout 2025, with one compromise dating back to 2023.

Technical Capabilities

BRICKSTORM is a custom Go or Rust-based backdoor with advanced evasion and persistence capabilities:

  • Multi-layer encryption using HTTPS, WebSockets, and nested TLS
  • DNS-over-HTTPS (DoH) to conceal C2 communications
  • SOCKS proxy functionality for lateral movement and tunneling
  • Self-monitoring that automatically reinstalls or restarts the malware if disrupted
  • File system manipulation including browse, upload, download, create, and delete operations

The malware masquerades as legitimate VMware processes (e.g., vmware-sphere, vnetd, vami) and modifies system init files to ensure execution at boot.

Attack Chain

In the confirmed incident, attackers:

  1. Accessed a web server inside the organization's DMZ
  2. Moved laterally to an internal VMware vCenter server
  3. Implanted BRICKSTORM malware
  4. Compromised two domain controllers and an ADFS server
  5. Exported cryptographic keys from the ADFS server
  6. Used access to steal cloned VM snapshots for credential extraction
  7. Created hidden rogue VMs for ongoing operations

The actors obtained legitimate credentials by performing system backups and capturing Active Directory database information.

Attribution

BRICKSTORM has been linked to UNC5221, the same threat cluster behind the exploitation of Ivanti Connect Secure zero-days (CVE-2023-46805 and CVE-2024-21887) in early 2024. Google Mandiant and CrowdStrike have also observed the malware targeting legal services, SaaS providers, and technology sectors.

Recommendations

CISA urges organizations to:

  • Scan systems for BRICKSTORM using the provided YARA and Sigma detection rules
  • Inventory all network edge devices
  • Monitor edge devices for suspicious network connectivity
  • Ensure proper network segmentation between DMZ and internal systems
  • Review service account usage and enforce least privilege
  • Block unauthorized DoH providers to prevent covert C2 resolution

Organizations that detect BRICKSTORM or related activity should report incidents to CISA at contact@cisa.dhs.gov or (888) 282-0870.

IOCs and detection signatures are available in STIX format from CISA's advisory page.

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire