CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details of a backdoor named BRICKSTORM that has been put to use by state-sponsored threat actors from the People’s Republic of China (PRC) to maintain long-term persistence on compromised systems.

“BRICKSTORM is a sophisticated backdoor for VMware vSphere and Windows environments,” the agency said. “BRICKSTORM enables cyber threat actors to maintain stealthy access and provides capabilities for initiation, persistence, and secure command-and-control.”

Written in Golang, the custom implant essentially gives bad actors interactive shell access on the system and allows them to browse, upload, download, create, delete, and manipulate files

The malware, mainly used in attacks targeting governments and information technology (IT) sectors, also supports multiple protocols, such as HTTPS, WebSockets, and nested Transport Layer Security (TLS), for command-and-control (C2), DNS-over-HTTPS (DoH) to conceal communications and blend in with normal traffic, and can act as a SOCKS proxy to facilitate lateral movement.

The cybersecurity agency did not disclose how many government agencies have been impacted or what type of data was stolen. The activity represents an ongoing tactical evolution of Chinese hacking groups, which have continued to strike edge network devices to breach networks and cloud infrastructures.

In a statement shared with Reuters, a spokesperson for the Chinese embassy in Washington rejected the accusations, stating the Chinese government does not “encourage, support, or connive at cyber attacks.”

Cybersecurity

BRICKSTORM was first documented by Google Mandiant in 2024 in attacks linked to the zero-day exploitation of Ivanti Connect Secure zero-day vulnerabilities (CVE-2023-46805 and CVE-2024-21887). The use of the malware has been attributed to two clusters tracked as UNC5221 and a new China-nexus adversary tracked by CrowdStrike as Warp Panda.

Earlier this September, Mandiant and Google Threat Intelligence Group (GTIG) said they observed legal services, software-as-a-service (SaaS) providers, Business Process Outsourcers (BPOs), and technology sectors in the U.S. being targeted by UNC5221 and other closely related threat activity clusters to deliver the malware.

A key feature of the malware, per CISA, is its ability to automatically reinstall or restart itself by means of a self-monitoring function that allows its continued operation in the face of any potential disruption.

In one case detected in April 2024, the threat actors are said to have accessed a web server inside an organization’s demilitarized zone (DMZ) using a web shell, before moving laterally to an internal VMware vCenter server and implanting BRICKSTORM. However, many details remain unknown, including the initial access vector used in the attack and when the web shell was deployed.

The attackers have also been found to leverage the access to obtain service account credentials and laterally move to a domain controller in the DMZ using Remote Desktop Protocol (RDP) so as to capture Active Directory information. Over the course of the intrusion, the threat actors managed to get the credentials for a managed service provider (MSP) account, which was then used to jump from the internal domain controller to the VMware vCenter server.

CISA said the actors also moved laterally from the web server using Server Message Block (SMB) to two jump servers and an Active Directory Federation Services (ADFS) server, exfiltrating cryptographic keys from the latter. The access to vCenter ultimately enabled the adversary to deploy BRICKSTORM after elevating their privileges.

“BRICKSTORM uses custom handlers to set up a SOCKS proxy, create a web server on the compromised system, and execute commands on the compromised system,” it said, adding some artifacts are “designed to work in virtualized environments, using a virtual socket (VSOCK) interface to enable inter-VM [virtual machine] communication, facilitate data exfiltration, and maintain persistence.”

Warp Panda Uses BRICKSTORM Against U.S. Entities

CrowdStrike, in its analysis of Warp Panda, said it has detected multiple intrusions targeting VMware vCenter environments at U.S.-based legal, technology, and manufacturing entities this year that have led to the deployment of BRICKSTORM. The group is believed to have been active since at least 2022.

“Warp Panda exhibits a high level of technical sophistication, advanced operations security (OPSEC) skills, and extensive knowledge of cloud and virtual machine (VM) environments,” the company said. “Warp Panda demonstrates a high level of stealth and almost certainly focuses on maintaining persistent, long-term, covert access to compromised networks.”

Evidence shows the hacking group gained initial access to one entity in late 2023. Also deployed in the attacks alongside BRICKSTORM are two previously undocumented Golang implants, namely Junction and GuestConduit, on ESXi hosts and guest VMs, respectively.

Junction acts as an HTTP server to listen for incoming requests and supports a wide range of capabilities to execute commands, proxy network traffic, and interact with guest VMs through VM sockets (VSOCK). GuestConduit, on the other hand, is a network traffic–tunneling implant that resides within a guest VM and establishes a VSOCK listener on port 5555. Its primary responsibility is to facilitate communication between guest VMs and hypervisors.

Initial access methods involve the exploitation of internet-facing edge devices to pivot to vCenter environments, either using valid credentials or abusing vCenter vulnerabilities. Lateral movement is achieved by using SSH and the privileged vCenter management account “vpxuser.” The hacking crew has also used the Secure File Transfer Protocol (SFTP) to move data between hosts.

Some of the exploited vulnerabilities are listed below –

The entire modus operandi revolves around maintaining stealth by clearing logs, timestomping files, and creating rogue VMs that are shut down after use. BRICKSTORM, masquerading as benign vCenter processes, is employed to tunnel traffic through vCenter servers, ESXi hosts, and guest VMs.

Similar to details shared by CISA, CrowdStrike noted that the attackers used their access to vCenter servers to clone domain controller VMs, possibly in a bid to harvest the Active Directory Domain Services database. The threat actors have also been spotted accessing the email accounts of employees who work in areas that align with Chinese government interests.

“Warp Panda likely used their access to one of the compromised networks to engage in rudimentary reconnaissance against an Asia Pacific government entity,” the company said. “They also connected to various cybersecurity blogs and a Mandarin-language GitHub repository.”

Cybersecurity

Another significant aspect of Warp Panda’s activities is their focus on establishing persistence in cloud environments and accessing sensitive data. Characterizing it as a “cloud-conscious adversary,” CrowdStrike said the attackers exploited their access to entities’ Microsoft Azure environments to access data stored in OneDrive, SharePoint, and Exchange.

In at least one incident, the hackers managed to get hold of user session tokens, likely by exfiltrating user browser files and tunneled traffic through BRICKSTORM implants to access Microsoft 365 services via a session replay attack and download SharePoint files related to the organization’s network engineering and incident response teams.

The attackers have also engaged in additional ways to set up persistence, such as by registering a new multi-factor authentication (MFA) device through an Authenticator app code after initially logging into a user account. In another intrusion, the Microsoft Graph API was used to enumerate service principals, applications, users, directory roles, and emails.

“The adversary primarily targets entities in North America and consistently maintains persistent, covert access to compromised networks, likely to support intelligence-collection efforts aligned with PRC strategic interests,” CrowdStrike said.

Source link

Visited 1 times, 1 visit(s) today

Related Article

From world’s biggest polluter to renewable energy juggernaut — TradingView News

From world’s biggest polluter to renewable energy juggernaut — TradingView News

China’s transformation into a renewable energy juggernaut over the last decade is nothing short of astonishing. Over the past decade, the People’s Republic has not only slashed its air pollution but also vaulted to the forefront of global clean energy production. This shift is driven by a potent mix of top-down policy, massive state investment,

Chinese, U.S. Navies Spotted Operating Near Scarborough Shoal

Chinese, U.S. Navies Spotted Operating Near Scarborough Shoal

A U.S. Navy destroyer was spotted operating near Chinese forces at Scarborough Shoal this week by a Philippine Coast Guard aerial patrol. A Philippine Coast Guard maritime domain awareness patrol spotted Chinese and American warships operating in proximity to each other near Scarborough Shoal earlier this week in the South China Sea. The presence of

Sen. Mark Warner on a Chinese tech threat that will be bigger than Huawei

Why senator says US should spy more on China’s companies

Go back a decade and most Americans had never heard of Huawei. Today, the Chinese telecom giant is a symbol of how quickly China can dominate a strategic technology sector and in the process create new national security and market threats for U.S. government and industry. Democratic Senator Mark Warner of Virginia, the top Democrat

Bishop of the Apostolic Prefecture of Xinxiang consecrated in China

Holy See satisfied with civil recognition of Chinese Bishop Zhang Weizhu

In a statement, the Director of the Holy See Press Office says civil recognition of the Bishop Emeritus of the Apostolic Prefecture of Xinxiang, in mainland China, is an important step in the communal journey of ecclesiastical circumscription. Vatican News  On Friday, December 5, the episcopal ordination of Bishop Francis Li Jianlin took place. “Satisfaction

Graduates attend a job fair at Fuyang Normal University in east China’s Anhui province. Photo: CFOTO/Future Publishing via Getty Images

China’s AI boom fuels solopreneurs as 1-person businesses flourish in tough job market

China’s artificial intelligence boom is giving rise to a new cohort of “solopreneurs”, who are turning their business dreams into reality with the help of technology, offering a glimmer of hope in an otherwise bleak job market. While there is no government data tracking this group, the proliferation of affordable AI models suggests that the

Baidu's robotaxi causes accident in a central city of China, leaves two in intensive care

Baidu’s robotaxi causes accident in a central city of China, leaves two in intensive care

An autonomous vehicle operated by Hello (formerly Hellobike) was involved in a serious accident in Zhuzhou, a city in central China, today, resulting in two pedestrians being hospitalised in intensive care. According to eyewitness reports and videos shared on social media, the self-driving vehicle struck two pedestrians at approximately 9:00 AM on Yanjiang Road. One

Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability

Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability

Dec 05, 2025Ravie LakshmananVulnerability / Software Security Two hacking groups with ties to China have been observed weaponizing the newly disclosed security flaw in React Server Components (RSC) within hours of it becoming public knowledge. The vulnerability in question is CVE-2025-55182 (CVSS score: 10.0), aka React2Shell, which allows unauthenticated remote code execution. It has been

Map Thumbnail

China & Taiwan Update, December 5, 2025

Toplines Taiwanese President William Lai Ching-te announced that his government will introduce the Special Budget for Asymmetric Warfare on November 25—the largest special budget in Taiwanese history.[1] The proposed budget would markedly improve Taiwanese warfighting capabilities and its efforts to implement an asymmetric defense strategy to deter a PRC invasion. The proposed budget amounts to

Taiwan to ban China's Rednote app for one year, says it is connected to 1,700 fraud cases

Taiwan to ban China’s Rednote app for one year, says it is connected to 1,700 fraud cases

Taiwan’s government has announced that it will ban access to the Chinese social media platform Rednote (known as Xiaohongshu in Chinese) for one year, citing security risks. The announcement attracted protest from the island’s largest opposition party, calling it an act of censorship. The Ministry of the Interior alleged that the Instagram-like app has been

China Soybean Buying Deadline Now February, Bessent Says

China Soybean Buying Deadline Now February, Bessent Says

Bloomberg’s Hallie Gu and Chris Anstey reported that “China is on pace to meet its pledge to buy 12 million tons of US soybeans by the end of February, US Treasury Secretary Scott Bessent said on Wednesday, appearing to extend an earlier deadline for Beijing’s purchases.” “The White House said last month that China had

Dutch minister admits being blindsided by China’s retaliation in Nexperia chip crisis

Dutch minister admits being blindsided by China’s retaliation in Nexperia chip crisis

Export controls may have been the economic weapon of choice in 2025, but the Dutch minister at the centre of the Nexperia crisis has admitted he was blindsided by Beijing when it blocked the company’s chips from leaving China. “An assessment was made of possible counterreactions; this wasn’t the most likely reaction from China,” said

The office of Nydia Velazquez, a Democratic congresswoman from New York, has been involved in locating Yuanxin. Photo: Zuma

US confirms Chinese boy Yuanxin, 6, is in federal custody. But where is he?

More than a week after US immigration authorities separated 6-year-old Yuanxin from his father during a routine check-in with ICE in New York, it has been confirmed that the child has been placed in the custody of the US Office of Refugee Resettlement. However, his location still remains unknown. The ORR, a federal agency within

Figure 1. Purdue/CME Group Ag Economy Barometer, October 2015-November 2025.

U.S.-China trade deal brightens farmers’ outlook

Farmer sentiment improved following the recent U.S.-China trade deal and optimism surrounding federal subsidies, potentially yielding a slight boost in farm equipment sales.  Purdue University’s Ag Economy Barometer rose 10 points in November to 139, its highest reading since June. The report, released Dec. 2, comprised responses from roughly 400 farmers surveyed from Nov. 10

Trump Proposes Weakening Fuel Economy Rules for Vehicles and Experts Say China Stands to Benefit

Trump Proposes Weakening Fuel Economy Rules for Vehicles and Experts Say China Stands to Benefit

A White House announcement indicated the Trump administration would loosen fuel economy standards meant to improve vehicle gas mileage. Credit: Engin_Akyurt/Pixabay At the White House today, President Donald Trump announced his administration would “reset” vehicle fuel economy standards. Trump said the administration plans to revoke tightened standards, also known as Corporate Average Fuel Economy (CAFE) standards, set by President Joe Biden

Cision

China Automotive Systems to mass-produce new high-torque eRCB motor

WUHAN, China, Dec. 5, 2025 /PRNewswire/ — China Automotive Systems, Inc. (NASDAQ: CAAS) (“CAAS” or the “Company”), a leading power steering components and systems supplier in China, today announced that its subsidiary, Hyoseong (Wuhan) Motion Mechatronics System Co. Ltd., has entered the final commissioning stage of its new 115–platform steering motor production line. Developed to support the CAAS eRCB

Key takeaways from Xi,Macron meeting at China

Key takeaways from Xi,Macron meeting at China

Key takeaways from Xi,Macron meeting at China French President Emmanuel Macron was accompanied by Chinese Leader Xi Jinping on Friday December 5,2025 as is Fourth state visit to China,reports Reuters. Xi Jinping accompanied the French leader amid a trip to Chengdu, China in a rare gesture reserved for the head of Europe’s second-largest economy that

China-Japan diplomatic feud over Taiwan issue escalates : NPR

Japan’s new prime minister, Sanae Takaichi, speaks during a press conference at the prime minister’s office in Tokyo, on Oct. 21. Eugene Hoshiko/Pool AP hide caption toggle caption Eugene Hoshiko/Pool AP SEOUL – The biggest feud between Japan and China in more than a decade appears to be escalating, with China trying to isolate Japan

The southern border, migrants and Border Patrol agents

Trump’s security blueprint targets mass migration and China threat

NEWYou can now listen to Fox News articles! President Donald Trump unveiled a new national security blueprint in which he declares “the era of mass migration is over” and paints China as a central threat to the U.S.  In the 33-page document released Friday morning, the president sets the stage for a foreign policy overhaul.

IceCure_Medical_Logo

IceCure secures China patent for novel cryogen flow control

Cryogenic flow control enhances the efficacy and precision of cryoablation procedures Robust IP portfolio becomes increasingly strategic as global interest in IceCure’s  platform and next-generation cryoablation technologies grows following ProSense®’s recent FDA marketing authorization in low-risk breast cancer CAESAREA, Israel, Dec. 5, 2025 /PRNewswire/ — IceCure Medical Ltd. (NASDAQ: ICCM) (“IceCure”, “IceCure Medical” or the

0
Would love your thoughts, please comment.x
()
x