Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Incidents
Incidents
/
BRICKSTORM Espionage Backdoor Targeting U.S. Tech and Legal Sectors

BRICKSTORM Espionage Backdoor Targeting U.S. Tech and Legal Sectors

Type
Campaign
Actors
💡UNC5221
Pub. date
September 25, 2025
Initial access
Unknown
Impact
Data exfiltration
Observed techniques
Valid creds abuseCredential theft
Observed tools
BRICKSTORM backdoorBRICKSTEAL
Targeted technologies
vCenter ServerESXi ServerApache Tomcat
References
https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign/
Status
Finalized
Last edited
Sep 30, 2025 1:30 PM

BRICKSTORM is a Go backdoor (with SOCKS proxying) deployed preferentially on Linux/BSD network and edge appliances that often lack EDR coverage. Attackers favor devices like VMware vCenter/ESXi as pivot points, using valid credentials harvested from appliances to move laterally. Observed variants show active development (e.g., Garble obfuscation, updated wssoft library, delayed beaconing), DNS-over-HTTPS for C2 resolution, and hosting via Cloudflare Workers/Heroku with no reuse of C2 domains across victims. Deployments are camouflaged to blend with host processes and persist by modifying init.d, rc.local, or systemd startup paths.

Privilege escalation and credential access were enabled via BRICKSTEAL (an in-memory Tomcat Servlet Filter hooking vCenter SSO URIs to capture creds) and SLAYSTYLE (a JSP web shell). Operators cloned sensitive Windows VMs (e.g., DCs, IdP, vaults) from vCenter to exfiltrate files without booting the clones, then removed artifacts. Email collection leveraged Entra ID enterprise apps with mail.read/full_access_as_app scopes, accessed via commercial VPNs and an obfuscation network.