BIGFISH TECHNOLOGY LIMITED
25 September 2025

Brickstorm Malware: An Advanced Spyware Threat Organizations Must Watch

In today’s cyber landscape, attacks targeting data theft and organizational espionage are becoming increasingly sophisticated and severe. One of the latest malware strains attracting attention from cybersecurity researchers is Brickstorm, classified as an Advanced Persistent Threat (APT) linked to a Chinese hacker group known as UNC5221.


What is Brickstorm?

Brickstorm is a spyware malware designed to infiltrate hard-to-detect systems and devices, including VMware ESXi, vCenter, and other critical network infrastructure. Its primary purpose is to steal sensitive information and monitor organizational activities.


Key Features of Brickstorm

Stealth and Persistence
Brickstorm uses encryption and delayed communication techniques with its command-and-control servers, allowing it to remain undetected for long periods. Some reports indicate it can persist in a system for up to 393 days before detection.


Targeting Hard-to-Protect Devices

This malware is specifically engineered to attack devices that traditional security tools often overlook, such as VMware ESXi servers and vCenter systems, which may not be regularly monitored by IT teams.


Data Theft and Espionage

Brickstorm targets highly sensitive data, including passwords, email communications, and critical business information. It also seeks unpatched vulnerabilities (zero-day exploits) that can be leveraged for future attacks.


Lateral Movement

Once inside a system, Brickstorm can use stolen credentials and modify system startup scripts to ensure the malware continues running even after system reboots.

 

How to Protect Against Brickstorm

  1. Regular System Monitoring
    Conduct frequent scans and monitor critical networks and devices for unusual activities.

  2. Use Appropriate Security Tools
    Deploy security solutions capable of detecting stealth malware and supporting hard-to-protect devices.

  3. Employee Awareness Training
    Educate staff on cybersecurity risks to reduce exposure from phishing links or unsafe files.

  4. Rapid Incident Response
    Implement scripts or expert tools to quickly identify and remove malware upon detection.


Conclusion

Brickstorm exemplifies a highly advanced cyber threat that organizations cannot afford to ignore. Due to its stealth capabilities and focus on critical infrastructure, organizations should adopt comprehensive defense measures, combining technical safeguards with employee cybersecurity awareness.