The U.S. Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the National Security Agency (NSA) and the Canadian Centre for Cyber Security, has issued an updated malware analysis report on a sophisticated backdoor named BRICKSTORM. The malware is attributed to Chinese state-sponsored threat actors and is being actively deployed against VMware vSphere and Microsoft Windows systems. BRICKSTORM serves as a persistent foothold in compromised networks, enabling attackers to conduct espionage, steal credentials, and exfiltrate data. The campaign's focus on critical infrastructure and public sector organizations, combined with its targeting of virtualization infrastructure, represents a significant national security threat.
BRICKSTORM is a highly capable backdoor that gives attackers deep control over compromised systems. The focus on VMware vSphere is particularly concerning, as compromising the hypervisor layer can give an attacker control over all virtual machines running on a host, effectively bypassing guest-level security controls.
Likely Attacker TTPs:
T1190).T1543.004 - Create or Modify System Process: Launch Daemon.T1053.005).T1003) to harvest passwords and tokens from memory.T1071 - Application Layer Protocol).The impact of a successful BRICKSTORM compromise is critical. By targeting virtualization infrastructure, the attackers gain a powerful position within the network. Potential impacts include:
The updated CISA report includes new Indicators of Compromise (IOCs) and detection signatures for BRICKSTORM. Security teams should immediately ingest these into their security tools.
Detection Strategies:
Strategic Recommendations:
New research reveals Chinese state-sponsored actors used 'ESXicape' zero-day vulnerabilities (CVE-2025-22224, -22225, -22226) for VM escape to ESXi hypervisor, developed a year before patches.
Harden VMware ESXi hosts by disabling unused services like the ESXi shell and SSH, and restricting access to management interfaces.
Mapped D3FEND Techniques:
Isolate the vSphere management network from general corporate and production traffic to prevent lateral movement to the hypervisors.
Mapped D3FEND Techniques:
Maintain a strict patching cadence for all VMware components to close vulnerabilities exploited by actors for initial access.
Mapped D3FEND Techniques:
To defend against threats like BRICKSTORM, hardening the VMware vSphere platform is paramount. This goes beyond patching. Administrators must disable the ESXi shell and SSH services by default, enabling them only for specific, time-bound troubleshooting tasks. Lockdown Mode should be enabled on ESXi hosts to force all administration through vCenter, preventing attackers from directly accessing hosts. Furthermore, secure boot should be enabled for both the ESXi hosts and the virtual machines they run to ensure the integrity of the boot process. These steps significantly reduce the attack surface available to an actor who has gained initial access to the management network.
Detecting a sophisticated backdoor like BRICKSTORM requires deep system integrity checks. Organizations should implement File Integrity Monitoring (FIM) on their ESXi hosts. A baseline hash of all critical system files, configurations, and installed VIBs should be created. The FIM solution should then periodically scan the hosts and compare them against this baseline, alerting on any unauthorized changes. This is crucial for detecting the installation of a malicious VIB or modifications to boot scripts, which are common persistence techniques for hypervisor-level malware.
A key way to detect and block backdoors like BRICKSTORM is by controlling their C2 communication. The management interfaces of ESXi hosts and vCenter servers should be subject to strict egress filtering. These systems have no legitimate reason to initiate connections to the public internet. A firewall rule should be in place to block all outbound traffic from the vSphere management network segment by default. This would prevent BRICKSTORM from reaching its C2 server, effectively neutralizing the malware and triggering firewall deny logs that would alert security teams to the compromise attempt.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats