State-Sponsored "BRICKSTORM" Backdoor Targets VMware and Windows in Critical Infrastructure

CISA and NSA Update Analysis of "BRICKSTORM" Backdoor Used by State-Sponsored Actors Against VMware and Windows Systems

HIGH
December 28, 2025
January 9, 2026
6m read
Threat ActorMalwareIndustrial Control Systems

Related Entities(initial)

Products & Tech

VMware vSphereWindows

Other

BRICKSTORMChina

Full Report(when first published)

Executive Summary

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the National Security Agency (NSA) and the Canadian Centre for Cyber Security, has issued an updated malware analysis report on a sophisticated backdoor named BRICKSTORM. The malware is attributed to Chinese state-sponsored threat actors and is being actively deployed against VMware vSphere and Microsoft Windows systems. BRICKSTORM serves as a persistent foothold in compromised networks, enabling attackers to conduct espionage, steal credentials, and exfiltrate data. The campaign's focus on critical infrastructure and public sector organizations, combined with its targeting of virtualization infrastructure, represents a significant national security threat.


Threat Overview

  • Malware: BRICKSTORM backdoor.
  • Threat Actor: Attributed to Chinese state-sponsored hackers.
  • Targets: Public sector and critical infrastructure organizations.
  • Affected Platforms: VMware vSphere and Microsoft Windows environments.
  • Capabilities: The malware is designed for:
    • Long-term, stealthy persistence.
    • Credential theft from compromised systems.
    • Lateral movement across the network.
    • Exfiltration of sensitive data.

Technical Analysis

BRICKSTORM is a highly capable backdoor that gives attackers deep control over compromised systems. The focus on VMware vSphere is particularly concerning, as compromising the hypervisor layer can give an attacker control over all virtual machines running on a host, effectively bypassing guest-level security controls.

Likely Attacker TTPs:

  • Initial Access: State-sponsored actors often use zero-day exploits or exploit n-day vulnerabilities in public-facing applications like VMware vCenter (T1190).
  • Execution: Once on the system, the attackers deploy the BRICKSTORM payload. On VMware ESXi hosts, this could involve installing a malicious VIB (vSphere Installation Bundle) as seen in T1543.004 - Create or Modify System Process: Launch Daemon.
  • Persistence: BRICKSTORM establishes persistence to survive reboots and maintain long-term access. This could involve techniques like modifying system files or creating scheduled tasks (T1053.005).
  • Credential Access: The malware is capable of credential theft, likely using techniques like OS Credential Dumping (T1003) to harvest passwords and tokens from memory.
  • Command and Control: The backdoor communicates with actor-controlled C2 servers to receive commands and exfiltrate data (T1071 - Application Layer Protocol).

Impact Assessment

The impact of a successful BRICKSTORM compromise is critical. By targeting virtualization infrastructure, the attackers gain a powerful position within the network. Potential impacts include:

  • Widespread Espionage: The ability to monitor, access, and exfiltrate data from any virtual server managed by the compromised vSphere environment.
  • Infrastructure Sabotage: The potential to disrupt or destroy critical infrastructure operations by shutting down or corrupting virtualized servers, including those in OT environments.
  • Supply Chain Attacks: Compromising a hypervisor could allow attackers to inject malware into virtual machine templates, leading to a widespread supply chain attack within the victim organization.
  • Loss of Control: A compromise at the hypervisor level means the integrity of the entire virtualized estate is lost.

Detection & Response

The updated CISA report includes new Indicators of Compromise (IOCs) and detection signatures for BRICKSTORM. Security teams should immediately ingest these into their security tools.

Detection Strategies:

  1. Hypervisor Integrity Monitoring: Use specialized tools or scripts to check the integrity of ESXi host files against known-good baselines. Look for unauthorized VIBs, modified system files, or unexpected listening ports on the hypervisor. This aligns with System File Analysis (D3-SFA).
  2. Log Analysis: Collect and analyze logs from vCenter and ESXi hosts. Monitor for anomalous API usage, suspicious logins (especially to the ESXi shell), and command execution that deviates from normal administrative activity.
  3. Network Traffic Analysis (D3-NTA): Monitor all network traffic from the hypervisor management interfaces. These interfaces should only communicate with vCenter and administrative workstations. Any connection to an external IP address is highly suspicious and should be investigated as a potential C2 channel.

Mitigation

Strategic Recommendations:

  1. Harden Virtualization Infrastructure (D3-PH): Treat your virtualization platform as a critical asset. Strictly limit access to vCenter and ESXi management interfaces. Disable unnecessary services on ESXi hosts (e.g., SSH, ESXi Shell) unless absolutely required for specific administrative tasks.
  2. Patch Management (M1051): Aggressively patch all components of the VMware environment, including vCenter, ESXi, and related management tools. State-sponsored actors are adept at weaponizing vulnerabilities quickly.
  3. Network Segmentation (M1030): Isolate the vSphere management network from all other networks (user, production, etc.). Access should be restricted to a dedicated and hardened administrative VLAN.
  4. Multi-factor Authentication (M1032): Enforce MFA for all access to vCenter, especially for accounts with administrative privileges. This is a critical defense against credential theft.

Timeline of Events

1
December 28, 2025
This article was published

Article Updates

January 9, 2026

New research reveals Chinese state-sponsored actors used 'ESXicape' zero-day vulnerabilities (CVE-2025-22224, -22225, -22226) for VM escape to ESXi hypervisor, developed a year before patches.

MITRE ATT&CK Mitigations

Harden VMware ESXi hosts by disabling unused services like the ESXi shell and SSH, and restricting access to management interfaces.

Mapped D3FEND Techniques:

Isolate the vSphere management network from general corporate and production traffic to prevent lateral movement to the hypervisors.

Mapped D3FEND Techniques:

Maintain a strict patching cadence for all VMware components to close vulnerabilities exploited by actors for initial access.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To defend against threats like BRICKSTORM, hardening the VMware vSphere platform is paramount. This goes beyond patching. Administrators must disable the ESXi shell and SSH services by default, enabling them only for specific, time-bound troubleshooting tasks. Lockdown Mode should be enabled on ESXi hosts to force all administration through vCenter, preventing attackers from directly accessing hosts. Furthermore, secure boot should be enabled for both the ESXi hosts and the virtual machines they run to ensure the integrity of the boot process. These steps significantly reduce the attack surface available to an actor who has gained initial access to the management network.

Detecting a sophisticated backdoor like BRICKSTORM requires deep system integrity checks. Organizations should implement File Integrity Monitoring (FIM) on their ESXi hosts. A baseline hash of all critical system files, configurations, and installed VIBs should be created. The FIM solution should then periodically scan the hosts and compare them against this baseline, alerting on any unauthorized changes. This is crucial for detecting the installation of a malicious VIB or modifications to boot scripts, which are common persistence techniques for hypervisor-level malware.

A key way to detect and block backdoors like BRICKSTORM is by controlling their C2 communication. The management interfaces of ESXi hosts and vCenter servers should be subject to strict egress filtering. These systems have no legitimate reason to initiate connections to the public internet. A firewall rule should be in place to block all outbound traffic from the vSphere management network segment by default. This would prevent BRICKSTORM from reaching its C2 server, effectively neutralizing the malware and triggering firewall deny logs that would alert security teams to the compromise attempt.

Sources & References(when first published)

Dec 2025: Biggest Cyber Attacks, Ransomware Attacks and Data Breaches
Cyber Management Alliance (cybermanagementalliance.com) December 28, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

BRICKSTORMAPTState-SponsoredCISANSAVMwarevSphereBackdoor

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading