Skip to content

Chinese State-Backed Hackers Exploit New BRICKSTORM Backdoor

State-backed Chinese hackers are using a new backdoor to target U.S. organizations. The campaign highlights the growing threat to sensitive data and national security.

This picture is clicked inside the room. In this picture, we see a table on which laptop, speaker,...
This picture is clicked inside the room. In this picture, we see a table on which laptop, speaker, monitor, keyboard, ball, mouse, scanner and papers are placed. In the left bottom of the picture, we see a table on which electronic goods are placed. Behind that, we see a wall on which charts and posters are pasted.

Chinese State-Backed Hackers Exploit New BRICKSTORM Backdoor

Chinese state-backed hackers have been exploiting a new backdoor, dubbed BRICKSTORM, to infiltrate organizations with sensitive data. The campaign, attributed to the UNC5221 threat actor, has been targeting manufacturers and service providers, with a particular focus on U.S. law firms.

The hackers, part of the Chinese cyber threat group UNC5221, have been using BRICKSTORM to gain access to critical systems and data. They've been targeting developers, system administrators, and individuals of interest to the People's Republic of China within these organizations. One known incident involved exploiting a zero-day vulnerability in an Ivanti Connect Secure edge device.

BRICKSTORM is primarily designed for Linux appliances, with a variant for Windows devices, although the latter has not been observed in use. The backdoor has been found on various appliance types, including VMware vCenter and ESXi hosts, which the hackers use for lateral movement within networks. The campaign is not linked to previously identified Chinese state groups like Silk Typhoon and Volt Typhoon, according to cybersecurity firm Mandiant.

The BRICKSTORM campaign highlights the ongoing threat posed by state-backed hackers to organizations holding sensitive data. With a focus on U.S. law firms and their involvement in U.S. national security and international trade, the implications are significant. Organizations are urged to bolster their cybersecurity measures, particularly on appliances lacking traditional endpoint detection and response agents.

Read also:

Latest