#brickstorm

[ follow ]
Information security
fromTheregister
3 months ago

Dell 0-day exploited by suspected Chinese snoops since 2024

A China-linked group exploited CVE-2026-22769 in Dell RecoverPoint for Virtual Machines to deploy persistent backdoors including Brickstorm and Grimbolt.
Information security
fromIT Pro
5 months ago

Chinese hackers are using 'stealthy and resilient' Brickstorm malware to target VMware servers and hide in networks for months at a time

China-sponsored actors use Brickstorm ELF Go backdoor to gain stealthy, persistent access to critical infrastructure and VMware vSphere systems for lateral movement and credential theft.
Information security
fromSecuritymagazine
5 months ago

State-Sponsored Actors Leverage Backdoor Malware, CISA Warns

PRC-linked state-sponsored cyber actors use the BRICKSTORM backdoor to target VMware vSphere, ESXi, and Windows for long-term persistence and credential theft.
Information security
fromThe Hacker News
5 months ago

CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems

BRICKSTORM is a Golang backdoor used by PRC-linked threat actors to maintain stealthy, long-term access to VMware vSphere and Windows systems via diverse C2 protocols.
Information security
fromTheregister
5 months ago

PRC spies Brickstromed their way into critical US networks

China-backed cyber actors used Brickstorm to maintain long-term access to multiple critical networks, infecting systems across Linux/VMware/Windows and stealing data and cryptographic keys.
fromNextgov.com
5 months ago

China is using advanced 'Brickstorm' malware against government and IT orgs, US assesses

The NSA and the Cybersecurity and Infrastructure Security Agency have assessed that China is using an advanced malware family to access government agencies and technology companies, according to extensive findings made public Thursday. The malware analysis, coauthored with Canadian cyber authorities, reflects September threat intelligence produced by Google and underscores the extent of the efforts the hackers have gone to quietly plant themselves into victims' systems for long-term snooping and potential sabotage.
Information security
#unc5221
[ Load more ]