Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Google Warns of BRICKSTORM Malware

September 26, 2025
Reading Time: 3 mins read
in Alerts
Fake PyPI Login Site Steals Credentials

A group of hackers linked to the Chinese government has been caught infiltrating a wide range of US organizations, from technology suppliers and legal firms to SaaS providers. According to Google researchers, the group is using highly sophisticated and evasive malware in a long-term espionage campaign. The attacks are not a smash-and-grab operation; instead, they are characterized by extreme patience and a deep understanding of their targets. This is what makes the campaign so dangerous: it’s designed to be quiet, slow, and hard to detect. It allows the hackers to spend over a year inside a company’s network, quietly siphoning off vast amounts of sensitive data.

At the heart of the attacks is a custom-built backdoor called BRICKSTORM. This malware is specifically designed to be planted on systems that often lack standard security coverage, such as VMware ESXi hypervisors and email gateways. Once in place, BRICKSTORM creates a SOCKS proxy, giving the attackers a covert and persistent way to access the network. In some cases, the hackers also installed another tool, BRICKSTEAL, which is a malicious Java Servlet filter on VMware vCenter servers. This second piece of malware was used to intercept administrator credentials, enabling the attackers to move deeper into the network and further expand their reach.

The extended period of time the malware goes undetected is particularly alarming. Google researchers found that, on average, the hackers were able to remain in a victim’s network for 393 days before they were discovered. This extended “dwell time” gives the attackers an enormous window to collect valuable information, including emails and source code. This level of stealth is unusual and shows a new level of sophistication. This is not just a one-off campaign, but a long-term espionage effort. The attackers are extremely careful, never reusing the same command-and-control IP addresses, which makes them even harder to track.

According to Google, the primary group behind these intrusions is a China-linked threat actor known as UNC5221, which has a history of targeting US organizations with these types of stealthy, long-term operations. While UNC5221 appears to be the main driver, researchers believe other Chinese state-backed groups are also collaborating and sharing tools and infrastructure. This collaboration broadens the campaign’s reach and sophistication. The victims span multiple critical sectors. By compromising technology suppliers and SaaS providers, the attackers are able to gain indirect access to sensitive data belonging to those companies’ customers. They have also specifically targeted law firms, searching the emails of individuals involved in US national security and international trade cases.

This campaign is especially concerning because of its focus on the supply chain. By compromising a single upstream vendor or service provider, the attackers gain indirect access to a wide variety of downstream networks and customers. This is what security experts call a “risk multiplier.” It echoes past large-scale compromises like the SolarWinds attack where trusted suppliers became a pathway for espionage. This means the impact of UNC5221’s activity isn’t confined to individual targets, but threatens to ripple across critical infrastructure, private industry, and even national security, demonstrating how state-backed cyber campaigns are leveraging the interconnectedness of modern IT supply chains to maximize their effectiveness.

Reference:

  • Google Warns of BRICKSTORM Malware Driving Supply Chain Intrusions Worldwide
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecuritySeptember 2025
ADVERTISEMENT

Related Posts

Fake PyPI Login Site Steals Credentials

Fake PyPI Login Site Steals Credentials

September 26, 2025
Fake PyPI Login Site Steals Credentials

Hidden WordPress Backdoors Create Admins

September 26, 2025
BadIIS Malware Spreads Via SEO Poisoning

Hackers Target AWS and Steal Credentials

September 24, 2025
BadIIS Malware Spreads Via SEO Poisoning

SonicWall SMA100 Update Removes Rootkit

September 24, 2025
BadIIS Malware Spreads Via SEO Poisoning

BadIIS Malware Spreads Via SEO Poisoning

September 24, 2025
FBI Issues Warning on Spoofed IC3 Website

FBI Issues Warning on Spoofed IC3 Website

September 22, 2025

Latest Alerts

Fake PyPI Login Site Steals Credentials

Google Warns of BRICKSTORM Malware

Hidden WordPress Backdoors Create Admins

Hackers Target AWS and Steal Credentials

SonicWall SMA100 Update Removes Rootkit

BadIIS Malware Spreads Via SEO Poisoning

Subscribe to our newsletter

    Latest Incidents

    Indian Bank Transfer Records Exposed

    Chinese Cyberspies Hit US Defense Firms

    Neon App Shuts Down After Data Leak

    Boyd Gaming Reports Data Breach After Attack

    Morrisroe UK Company Hit By Cyber Attack

    GeoServer Flaw Breaches US Agency Network

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial