← All briefs
high September 28, 2025

Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors

Source report →

The BRICKSTORM campaign has demonstrated sustained, stealthy footholds in targets across different sectors within the U.S., aiming for intelligence, IP theft, and as pivot platforms for further infiltration. The actor prioritizes deployment to network or virtualization appliances (systems typically outside the purview of endpoint defenses) to enable long dwell times while minimizing observable telemetry. From these footholds, the adversary moves laterally into VMware vCenter/ESXi environments, often using valid credentials, and in certain cases clones sensitive VMs (e.g. domain controllers) for offline analysis. They also deploy a companion servlet-filter (BRICKSTEAL) in vCenter’s Tomcat to capture credentials in HTTP requests, and exfiltrate email and code repositories using BRICKSTORM’s SOCKS proxy capability and Microsoft 365 mail application permissions.

What stands out about this iteration of BRICKSTORM activity is the increased focus on appliances and virtualization management layers as primary vectors, rather than just endpoints, and the sophistication of adaptive persistence. The threat actor has begun to obfuscate new BRICKSTORM samples via Go obfuscation and embed delayed-activation timers to evade discovery. They demonstrated opportunistic redeployment even mid-incident to re-establish access, showing real-time monitoring of defenders’ actions. Another noteworthy shift is the use of cloud-oriented platforms (e.g. Cloudflare Workers, Heroku) and multiple DNS-over-HTTPS resolvers for C2, with no reuse of domains across victims, elevating their OPSEC and reducing signature reuse risk.

The original blog provides YARA rules and a tool to detect UNC5221 in the network.

IP ADDRESS 1
10.0.0.255:5480
DOMAIN 2
nip.io
sslip.io
SHA256 FILE HASH 3
2388ed7aee0b6b392778e8f9e98871c06499f476c9e7eae6ca0916f827fe65df
aa688682d44f0c6b0ed7f30b981a609100107f2d414a3a6e5808671b112d1878
90b760ed1d0dcb3ef0f2b6d6195c9d852bcb65eca293578982a8c4b64f51b035

Detections

Additional detection ideas (9)
  • Detect traffic routing through proxy services, VPNs, or residential proxy networks not sanctioned by the organization
  • Detect logins from valid accounts originating from unusual locations, devices, or at abnormal times
  • Detect broad file system enumeration or searching across SharePoint, code repos, and internal wikis
  • Monitor for C2 communication over HTTP/HTTPS to uncommon or newly registered domains
  • Monitor public-facing services for exploitation patterns — unusual POST bodies, deserialization payloads
  • Baseline normal scripting interpreter usage and alert on deviations
  • Flag heavily obfuscated scripts or binaries with high entropy content
  • Flag suspicious PowerShell execution — encoded commands, download cradles, or AMSI bypass
  • Alert on creation of new accounts, especially those immediately granted privileged roles