Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors

0
Medium
Published: Wed Oct 08 2025 (10/08/2025, 15:21:42 UTC)
Source: AlienVault OTX General

Description

Google Threat Intelligence Group (GTIG) is tracking BRICKSTORM malware activity, which is being used to maintain persistent access to victim organizations in the United States. Since March 2025, Mandiant Consulting has responded to intrusions across a range of industry verticals, most notably legal services, Software as a Service (SaaS) providers, Business Process Outsourcers (BPOs), and Technology. The value of these targets extends beyond typical espionage missions, potentially providing data to feed development of zero-days and establishing pivot points for broader access to downstream victims.

AI-Powered Analysis

AILast updated: 10/08/2025, 15:31:58 UTC

Technical Analysis

BRICKSTORM is a sophisticated backdoor malware campaign identified by the Google Threat Intelligence Group and Mandiant Consulting, active since March 2025. It targets organizations primarily in the United States but poses a risk globally, including Europe, especially in legal services, SaaS providers, BPOs, and technology sectors. The malware facilitates stealthy, persistent access to victim environments, enabling espionage activities that may support zero-day exploit development and provide pivot points for broader network compromise. BRICKSTORM affects both Windows and Linux systems and is associated with VMware vCenter components, indicating targeting of virtualized infrastructure. The malware employs multiple MITRE ATT&CK techniques such as T1071 (using application layer protocols for command and control), T1566 (phishing for initial access), T1546 (event-triggered execution for persistence), T1036 (masquerading), T1003 (credential dumping), and T1021 (remote services like SSH). It also uses SOCKS proxies and SSH tunneling to obfuscate network traffic and maintain covert communications. Indicators of compromise include specific MD5 and SHA1 hashes and YARA signatures. The adversary behind this campaign is UNC5221, a group linked to espionage operations. No known public exploits or CVEs are associated yet, and no patches are available. The campaign's medium severity rating reflects its espionage focus, persistence, and complexity, though it requires initial access and some level of user or system interaction to deploy. The malware's ability to maintain long-term access and target high-value sectors makes it a significant threat for organizations handling sensitive intellectual property and confidential data.

Potential Impact

For European organizations, BRICKSTORM poses a significant espionage threat, particularly to those in the technology, legal, SaaS, and BPO sectors. Compromise could lead to unauthorized access to sensitive client data, intellectual property theft, and exposure of confidential legal documents. The targeting of VMware vCenter and backup systems suggests potential disruption or manipulation of virtualized environments, which are widely used in European enterprises. Persistent access could enable attackers to move laterally within networks, increasing the risk of widespread data breaches and supply chain compromises. The malware's use of sophisticated evasion and proxy techniques complicates detection and response efforts, potentially allowing attackers to remain undetected for extended periods. This could undermine trust in affected organizations, lead to regulatory penalties under GDPR for data breaches, and damage competitive advantage. The espionage nature also raises concerns about state-sponsored or highly resourced threat actors targeting strategic sectors in Europe. Overall, the impact includes confidentiality loss, potential integrity compromise of critical systems, and operational disruption risks.

Mitigation Recommendations

European organizations should implement targeted detection strategies using the provided IOCs (hashes and YARA rules) to identify BRICKSTORM infections. Network segmentation should be enforced to isolate critical infrastructure such as VMware vCenter servers and backup systems, limiting lateral movement opportunities. Enhanced monitoring of privileged accounts and unusual SSH or proxy traffic is essential to detect covert communications and unauthorized access. Deploy endpoint detection and response (EDR) solutions capable of identifying MITRE ATT&CK techniques related to persistence, credential dumping, and masquerading. Conduct phishing awareness training to reduce initial access risk via social engineering. Regularly audit system configurations and event logs for signs of event-triggered execution or suspicious scheduled tasks. Since no patches exist, organizations should apply virtual patching via network controls and firewall rules to restrict outbound connections to known malicious command and control servers. Collaborate with threat intelligence sharing groups to stay updated on new indicators and tactics. Finally, develop and test incident response plans specific to advanced persistent threats to enable rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign/"]
Adversary
UNC5221
Pulse Id
68e681878d2b2b236757c808
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash123e80a34508c4dede7cc70e76931fcc
MD5 of 2388ed7aee0b6b392778e8f9e98871c06499f476c9e7eae6ca0916f827fe65df
hash84b573305b732a8372a082c057242953
MD5 of aa688682d44f0c6b0ed7f30b981a609100107f2d414a3a6e5808671b112d1878
hashb1b7aaa5bd4408a4d3003a9fabcdd041
MD5 of 90b760ed1d0dcb3ef0f2b6d6195c9d852bcb65eca293578982a8c4b64f51b035
hash130fdc32de36a362e65c7138b560eb8d8f6ae599
SHA1 of 2388ed7aee0b6b392778e8f9e98871c06499f476c9e7eae6ca0916f827fe65df
hashb8eed63ab9cbdca494f26a6f66bfd4a0a693b3f0
SHA1 of 90b760ed1d0dcb3ef0f2b6d6195c9d852bcb65eca293578982a8c4b64f51b035
hashf1f64ed1ee74d3b84f338a612e59c81997d6f70e
SHA1 of aa688682d44f0c6b0ed7f30b981a609100107f2d414a3a6e5808671b112d1878
hash2388ed7aee0b6b392778e8f9e98871c06499f476c9e7eae6ca0916f827fe65df
hash90b760ed1d0dcb3ef0f2b6d6195c9d852bcb65eca293578982a8c4b64f51b035
hashaa688682d44f0c6b0ed7f30b981a609100107f2d414a3a6e5808671b112d1878

Yara

ValueDescriptionCopy
yara009aa7db2e6cd294da1dac8df66fb1d880d6bf93
yara03a8b9f9ccf65cf7330f7fddb8c9084e2b783be7
yara0bb85c4344c3196496e5817424c80021f38d3c14
yara207e23e1c19b47d68882a475e03a535b05ce3e07
yara2c58aa9d2cd9bed1ce62915957eba6b56a2f82e0
yara302662a77db55dfae75764418c8fa2445a2b5cc4
yara37544a1735dd2e4ecd41cca16273678414f9fc22
yara711097c1844d3737e9e840f0f419be23bc8f47f6
yarab96145f83a8f391c40cf260a4dd45d661fd91e83

Threat ID: 68e683ab620140f5ffd3e0fa

Added to database: 10/8/2025, 3:30:51 PM

Last enriched: 10/8/2025, 3:31:58 PM

Last updated: 10/9/2025, 3:14:05 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats