Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
Google Threat Intelligence Group (GTIG) is tracking BRICKSTORM malware activity, which is being used to maintain persistent access to victim organizations in the United States. Since March 2025, Mandiant Consulting has responded to intrusions across a range of industry verticals, most notably legal services, Software as a Service (SaaS) providers, Business Process Outsourcers (BPOs), and Technology. The value of these targets extends beyond typical espionage missions, potentially providing data to feed development of zero-days and establishing pivot points for broader access to downstream victims.
AI Analysis
Technical Summary
BRICKSTORM is a sophisticated backdoor malware campaign identified by the Google Threat Intelligence Group and Mandiant Consulting, active since March 2025. It targets organizations primarily in the United States but poses a risk globally, including Europe, especially in legal services, SaaS providers, BPOs, and technology sectors. The malware facilitates stealthy, persistent access to victim environments, enabling espionage activities that may support zero-day exploit development and provide pivot points for broader network compromise. BRICKSTORM affects both Windows and Linux systems and is associated with VMware vCenter components, indicating targeting of virtualized infrastructure. The malware employs multiple MITRE ATT&CK techniques such as T1071 (using application layer protocols for command and control), T1566 (phishing for initial access), T1546 (event-triggered execution for persistence), T1036 (masquerading), T1003 (credential dumping), and T1021 (remote services like SSH). It also uses SOCKS proxies and SSH tunneling to obfuscate network traffic and maintain covert communications. Indicators of compromise include specific MD5 and SHA1 hashes and YARA signatures. The adversary behind this campaign is UNC5221, a group linked to espionage operations. No known public exploits or CVEs are associated yet, and no patches are available. The campaign's medium severity rating reflects its espionage focus, persistence, and complexity, though it requires initial access and some level of user or system interaction to deploy. The malware's ability to maintain long-term access and target high-value sectors makes it a significant threat for organizations handling sensitive intellectual property and confidential data.
Potential Impact
For European organizations, BRICKSTORM poses a significant espionage threat, particularly to those in the technology, legal, SaaS, and BPO sectors. Compromise could lead to unauthorized access to sensitive client data, intellectual property theft, and exposure of confidential legal documents. The targeting of VMware vCenter and backup systems suggests potential disruption or manipulation of virtualized environments, which are widely used in European enterprises. Persistent access could enable attackers to move laterally within networks, increasing the risk of widespread data breaches and supply chain compromises. The malware's use of sophisticated evasion and proxy techniques complicates detection and response efforts, potentially allowing attackers to remain undetected for extended periods. This could undermine trust in affected organizations, lead to regulatory penalties under GDPR for data breaches, and damage competitive advantage. The espionage nature also raises concerns about state-sponsored or highly resourced threat actors targeting strategic sectors in Europe. Overall, the impact includes confidentiality loss, potential integrity compromise of critical systems, and operational disruption risks.
Mitigation Recommendations
European organizations should implement targeted detection strategies using the provided IOCs (hashes and YARA rules) to identify BRICKSTORM infections. Network segmentation should be enforced to isolate critical infrastructure such as VMware vCenter servers and backup systems, limiting lateral movement opportunities. Enhanced monitoring of privileged accounts and unusual SSH or proxy traffic is essential to detect covert communications and unauthorized access. Deploy endpoint detection and response (EDR) solutions capable of identifying MITRE ATT&CK techniques related to persistence, credential dumping, and masquerading. Conduct phishing awareness training to reduce initial access risk via social engineering. Regularly audit system configurations and event logs for signs of event-triggered execution or suspicious scheduled tasks. Since no patches exist, organizations should apply virtual patching via network controls and firewall rules to restrict outbound connections to known malicious command and control servers. Collaborate with threat intelligence sharing groups to stay updated on new indicators and tactics. Finally, develop and test incident response plans specific to advanced persistent threats to enable rapid containment and remediation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Belgium, Sweden
Indicators of Compromise
- hash: 123e80a34508c4dede7cc70e76931fcc
- hash: 84b573305b732a8372a082c057242953
- hash: b1b7aaa5bd4408a4d3003a9fabcdd041
- hash: 130fdc32de36a362e65c7138b560eb8d8f6ae599
- hash: b8eed63ab9cbdca494f26a6f66bfd4a0a693b3f0
- hash: f1f64ed1ee74d3b84f338a612e59c81997d6f70e
- hash: 2388ed7aee0b6b392778e8f9e98871c06499f476c9e7eae6ca0916f827fe65df
- hash: 90b760ed1d0dcb3ef0f2b6d6195c9d852bcb65eca293578982a8c4b64f51b035
- hash: aa688682d44f0c6b0ed7f30b981a609100107f2d414a3a6e5808671b112d1878
- yara: 009aa7db2e6cd294da1dac8df66fb1d880d6bf93
- yara: 03a8b9f9ccf65cf7330f7fddb8c9084e2b783be7
- yara: 0bb85c4344c3196496e5817424c80021f38d3c14
- yara: 207e23e1c19b47d68882a475e03a535b05ce3e07
- yara: 2c58aa9d2cd9bed1ce62915957eba6b56a2f82e0
- yara: 302662a77db55dfae75764418c8fa2445a2b5cc4
- yara: 37544a1735dd2e4ecd41cca16273678414f9fc22
- yara: 711097c1844d3737e9e840f0f419be23bc8f47f6
- yara: b96145f83a8f391c40cf260a4dd45d661fd91e83
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
Description
Google Threat Intelligence Group (GTIG) is tracking BRICKSTORM malware activity, which is being used to maintain persistent access to victim organizations in the United States. Since March 2025, Mandiant Consulting has responded to intrusions across a range of industry verticals, most notably legal services, Software as a Service (SaaS) providers, Business Process Outsourcers (BPOs), and Technology. The value of these targets extends beyond typical espionage missions, potentially providing data to feed development of zero-days and establishing pivot points for broader access to downstream victims.
AI-Powered Analysis
Technical Analysis
BRICKSTORM is a sophisticated backdoor malware campaign identified by the Google Threat Intelligence Group and Mandiant Consulting, active since March 2025. It targets organizations primarily in the United States but poses a risk globally, including Europe, especially in legal services, SaaS providers, BPOs, and technology sectors. The malware facilitates stealthy, persistent access to victim environments, enabling espionage activities that may support zero-day exploit development and provide pivot points for broader network compromise. BRICKSTORM affects both Windows and Linux systems and is associated with VMware vCenter components, indicating targeting of virtualized infrastructure. The malware employs multiple MITRE ATT&CK techniques such as T1071 (using application layer protocols for command and control), T1566 (phishing for initial access), T1546 (event-triggered execution for persistence), T1036 (masquerading), T1003 (credential dumping), and T1021 (remote services like SSH). It also uses SOCKS proxies and SSH tunneling to obfuscate network traffic and maintain covert communications. Indicators of compromise include specific MD5 and SHA1 hashes and YARA signatures. The adversary behind this campaign is UNC5221, a group linked to espionage operations. No known public exploits or CVEs are associated yet, and no patches are available. The campaign's medium severity rating reflects its espionage focus, persistence, and complexity, though it requires initial access and some level of user or system interaction to deploy. The malware's ability to maintain long-term access and target high-value sectors makes it a significant threat for organizations handling sensitive intellectual property and confidential data.
Potential Impact
For European organizations, BRICKSTORM poses a significant espionage threat, particularly to those in the technology, legal, SaaS, and BPO sectors. Compromise could lead to unauthorized access to sensitive client data, intellectual property theft, and exposure of confidential legal documents. The targeting of VMware vCenter and backup systems suggests potential disruption or manipulation of virtualized environments, which are widely used in European enterprises. Persistent access could enable attackers to move laterally within networks, increasing the risk of widespread data breaches and supply chain compromises. The malware's use of sophisticated evasion and proxy techniques complicates detection and response efforts, potentially allowing attackers to remain undetected for extended periods. This could undermine trust in affected organizations, lead to regulatory penalties under GDPR for data breaches, and damage competitive advantage. The espionage nature also raises concerns about state-sponsored or highly resourced threat actors targeting strategic sectors in Europe. Overall, the impact includes confidentiality loss, potential integrity compromise of critical systems, and operational disruption risks.
Mitigation Recommendations
European organizations should implement targeted detection strategies using the provided IOCs (hashes and YARA rules) to identify BRICKSTORM infections. Network segmentation should be enforced to isolate critical infrastructure such as VMware vCenter servers and backup systems, limiting lateral movement opportunities. Enhanced monitoring of privileged accounts and unusual SSH or proxy traffic is essential to detect covert communications and unauthorized access. Deploy endpoint detection and response (EDR) solutions capable of identifying MITRE ATT&CK techniques related to persistence, credential dumping, and masquerading. Conduct phishing awareness training to reduce initial access risk via social engineering. Regularly audit system configurations and event logs for signs of event-triggered execution or suspicious scheduled tasks. Since no patches exist, organizations should apply virtual patching via network controls and firewall rules to restrict outbound connections to known malicious command and control servers. Collaborate with threat intelligence sharing groups to stay updated on new indicators and tactics. Finally, develop and test incident response plans specific to advanced persistent threats to enable rapid containment and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign/"]
- Adversary
- UNC5221
- Pulse Id
- 68e681878d2b2b236757c808
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash123e80a34508c4dede7cc70e76931fcc | MD5 of 2388ed7aee0b6b392778e8f9e98871c06499f476c9e7eae6ca0916f827fe65df | |
hash84b573305b732a8372a082c057242953 | MD5 of aa688682d44f0c6b0ed7f30b981a609100107f2d414a3a6e5808671b112d1878 | |
hashb1b7aaa5bd4408a4d3003a9fabcdd041 | MD5 of 90b760ed1d0dcb3ef0f2b6d6195c9d852bcb65eca293578982a8c4b64f51b035 | |
hash130fdc32de36a362e65c7138b560eb8d8f6ae599 | SHA1 of 2388ed7aee0b6b392778e8f9e98871c06499f476c9e7eae6ca0916f827fe65df | |
hashb8eed63ab9cbdca494f26a6f66bfd4a0a693b3f0 | SHA1 of 90b760ed1d0dcb3ef0f2b6d6195c9d852bcb65eca293578982a8c4b64f51b035 | |
hashf1f64ed1ee74d3b84f338a612e59c81997d6f70e | SHA1 of aa688682d44f0c6b0ed7f30b981a609100107f2d414a3a6e5808671b112d1878 | |
hash2388ed7aee0b6b392778e8f9e98871c06499f476c9e7eae6ca0916f827fe65df | — | |
hash90b760ed1d0dcb3ef0f2b6d6195c9d852bcb65eca293578982a8c4b64f51b035 | — | |
hashaa688682d44f0c6b0ed7f30b981a609100107f2d414a3a6e5808671b112d1878 | — |
Yara
Value | Description | Copy |
---|---|---|
yara009aa7db2e6cd294da1dac8df66fb1d880d6bf93 | — | |
yara03a8b9f9ccf65cf7330f7fddb8c9084e2b783be7 | — | |
yara0bb85c4344c3196496e5817424c80021f38d3c14 | — | |
yara207e23e1c19b47d68882a475e03a535b05ce3e07 | — | |
yara2c58aa9d2cd9bed1ce62915957eba6b56a2f82e0 | — | |
yara302662a77db55dfae75764418c8fa2445a2b5cc4 | — | |
yara37544a1735dd2e4ecd41cca16273678414f9fc22 | — | |
yara711097c1844d3737e9e840f0f419be23bc8f47f6 | — | |
yarab96145f83a8f391c40cf260a4dd45d661fd91e83 | — |
Threat ID: 68e683ab620140f5ffd3e0fa
Added to database: 10/8/2025, 3:30:51 PM
Last enriched: 10/8/2025, 3:31:58 PM
Last updated: 10/9/2025, 3:14:05 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Your Shipment Notification Is Now a Malware Dropper
MediumNew Chaos-C++ Ransomware Targets Windows by Wiping Data and Stealing Crypto
MediumFrom Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine
MediumFake Teams Installers Dropping Oyster Backdoor (aka Broomstick) in New Malvertising Scam
MediumVampire Bot Malware Sinks Fangs Into Job Hunters
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.