Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Pulsar X2 Crazylight Medium review: Light as air, strong on performance

    Raycast is finally on Windows, and it totally changed how I use my PC

    LG’s Gallery TV promises to transform your wall into an art museum

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      A new pope, political shake-ups and celebs in space: The 2025-in-review news quiz

      December 31, 2025

      AI has become the norm for students. Teachers are playing catch-up.

      December 23, 2025

      Trump signs executive order seeking to ban states from regulating AI companies

      December 13, 2025

      Apple’s AI chief abruptly steps down

      December 3, 2025

      The issue that’s scrambling both parties: From the Politics Desk

      December 3, 2025
    • Business

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025

      Zeroday Cloud hacking event awards $320,0000 for 11 zero days

      December 18, 2025

      Amazon: Ongoing cryptomining campaign uses hacked AWS accounts

      December 18, 2025

      Want to back up your iPhone securely without paying the Apple tax? There’s a hack for that, but it isn’t for everyone… yet

      December 16, 2025
    • Crypto

      US Jobless Claims Drop Sharply, Fed Rate Cuts Look Less Urgent

      December 31, 2025

      Ripple’s $1 Billion XRP Unlock Starts 2026, But Is It a Non-Event? | US Crypto News

      December 31, 2025

      An 80% Wipeout Hasn’t Stopped Korean Retail From Chasing Tom Lee’s BitMine

      December 31, 2025

      Zcash Price Eyes $672 Target After Clearing $500 Resistance

      December 31, 2025

      Trump Media to Launch New Token With Special Benefits

      December 31, 2025
    • Technology

      Pulsar X2 Crazylight Medium review: Light as air, strong on performance

      January 1, 2026

      Raycast is finally on Windows, and it totally changed how I use my PC

      January 1, 2026

      LG’s Gallery TV promises to transform your wall into an art museum

      January 1, 2026

      Guard against a corrupted Windows install with a system restore point

      January 1, 2026

      Murena taking pre-orders for the Hiroh smartphone powered by /e/OS, a privacy-focused version of Android 16

      January 1, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»CISA warns of Chinese “BrickStorm” malware attacks on VMware servers
    Technology

    CISA warns of Chinese “BrickStorm” malware attacks on VMware servers

    TechAiVerseBy TechAiVerseDecember 5, 2025No Comments3 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    CISA warns of Chinese “BrickStorm” malware attacks on VMware servers
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    CISA warns of Chinese “BrickStorm” malware attacks on VMware servers

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned network defenders of Chinese hackers backdooring VMware vSphere servers with Brickstorm malware.

    In a joint malware analysis report with the National Security Agency (NSA) and Canada’s Cyber Security Centre, CISA says it analyzed eight Brickstorm malware samples.

    These samples were discovered on networks belonging to victim organizations, where the attackers specifically targeted VMware vSphere servers to create hidden rogue virtual machines to evade detection and steal cloned virtual machine snapshots for further credential theft.

    As noted in the advisory, Brickstorm uses multiple layers of encryption, including HTTPS, WebSockets, and nested TLS to secure communication channels, a SOCKS proxy for tunneling and lateral movement within compromised networks, and DNS-over-HTTPS (DoH) for added concealment. To maintain persistence, Brickstorm also includes a self-monitoring function that automatically reinstalls or restarts the malware if interrupted.

    While investigating one of the incidents, CISA found that Chinese hackers compromised a web server in an organization’s demilitarized zone (DMZ) in April 2024, then moved laterally to an internal VMware vCenter server and deployed malware.

    The attackers also hacked two domain controllers on the victim’s network and exported cryptographic keys after compromising an Active Directory Federation Services (ADFS) server. The Brickstorm implant allowed them to maintain access to the breached systems from at least April 2024 through September 2025.

    After obtaining system access, they’ve also been observed capturing Active Directory database information and performing system backups to steal legitimate credentials and other sensitive data.

    Hackers’ lateral movement in the victim’s network (CISA)

    ​To detect the attackers’ presence on their networks and block potential attacks, CISA advises defenders (especially those working for critical infrastructure and government organizations) to scan for Brickstorm backdoor activity using agency-created YARA and Sigma rules, and block unauthorized DNS-over-HTTPS providers and external traffic.

    They should also take inventory of all network edge devices to monitor for suspicious activity and segment the network to restrict traffic from demilitarized zones to internal networks.

    “CISA, NSA, and Cyber Centre urge organizations to use the indicators of compromise (IOCs) and detection signatures in this Malware Analysis Report to identify BRICKSTORM malware samples,” the joint advisory urges. “If BRICKSTORM, similar malware, or potentially related activity is detected, CISA and NSA urge organizations to report the activity as required by law and applicable policies.”

    Today, cybersecurity firm CrowdStrike also linked Brickstorm malware attacks targeting VMware vCenter servers on the networks of U.S. legal, technology, and manufacturing companies throughout 2025 to a Chinese hacking group it tracks as Warp Panda. CrowdStrike observed the same threat group deploying previously unknown Junction and GuestConduit malware implants in VMware ESXi environments.

    The joint advisory comes on the heels of a Google Threat Intelligence Group (GTIG) report published in September that described how suspected Chinese hackers used the Brickstorm malware (first documented by Google subsidiary Mandiant in April 2024) to gain long-term persistence on the networks of multiple U.S. organizations in the technology and legal sectors.

    Google security researchers linked these attacks to the UNC5221 malicious activity cluster, known for exploiting Ivanti zero-days to target government agencies with custom Spawnant and Zipline malware.

    Break down IAM silos like Bitpanda, KnowBe4, and PathAI

    Broken IAM isn’t just an IT problem – the impact ripples across your whole business.

    This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what “good” IAM looks like, and a simple checklist for building a scalable strategy.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleCongress warned that NASA’s current plan for Artemis “cannot work”
    Next Article Russia blocks FaceTime and Snapchat for alleged use by terrorists
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Pulsar X2 Crazylight Medium review: Light as air, strong on performance

    January 1, 2026

    Raycast is finally on Windows, and it totally changed how I use my PC

    January 1, 2026

    LG’s Gallery TV promises to transform your wall into an art museum

    January 1, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025565 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025209 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025114 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 202597 Views
    Don't Miss
    Technology January 1, 2026

    Pulsar X2 Crazylight Medium review: Light as air, strong on performance

    Pulsar X2 Crazylight Medium review: Light as air, strong on performance Skip to content Image:…

    Raycast is finally on Windows, and it totally changed how I use my PC

    LG’s Gallery TV promises to transform your wall into an art museum

    Guard against a corrupted Windows install with a system restore point

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Pulsar X2 Crazylight Medium review: Light as air, strong on performance

    January 1, 20263 Views

    Raycast is finally on Windows, and it totally changed how I use my PC

    January 1, 20264 Views

    LG’s Gallery TV promises to transform your wall into an art museum

    January 1, 20263 Views
    Most Popular

    What to Know and Where to Find Apple Intelligence Summaries on iPhone

    March 12, 20250 Views

    A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

    March 12, 20250 Views

    Senua’s Saga: Hellblade 2 leads BAFTA Game Awards 2025 nominations

    March 12, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.