On December 4, 2025, a coalition of top Western cybersecurity agencies—the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Canadian Centre for Cyber Security—released a joint advisory and detailed malware analysis report on a sophisticated backdoor dubbed BRICKSTORM. The report attributes the malware to People's Republic of China (PRC) state-sponsored threat actors. These actors are leveraging BRICKSTORM to establish long-term, persistent access within compromised networks, with a primary focus on Government Services and Information Technology sectors. The malware is notable for its advanced stealth capabilities, including the use of DNS-over-HTTPS (DoH) for C2 communications and a self-healing mechanism to ensure persistence. The advisory provides indicators of compromise (IOCs) and TTPs to help organizations hunt for and defend against this threat.
BRICKSTORM is a versatile and stealthy backdoor engineered for both VMware vSphere and Microsoft Windows environments. Its core purpose is to provide the threat actor with persistent, covert access to a target's network. The PRC state-sponsored actors behind this campaign have demonstrated a patient, multi-stage attack methodology.
The typical attack chain observed by CISA involves:
This methodical approach allows the actors to embed themselves deep within a network, often going undetected for long periods.
The BRICKSTORM malware exhibits several advanced technical features designed for stealth and resilience:
T1071.004 - Application Layer Protocol: DNS-over-HTTPS.T1090 - Proxy.T1543 - Create or Modify System Process.A successful BRICKSTORM intrusion can have severe consequences for an organization. The primary impact is the establishment of a long-term, persistent foothold by a sophisticated state-sponsored actor. This access can be used for:
The targeting of VMware vCenter is particularly damaging, as it provides the attackers with control over the virtualized infrastructure, allowing them to create, modify, or delete virtual machines at will.
D3-NTA: Network Traffic Analysis is essential.D3-LAM: Local Account Monitoring should be applied to vCenter accounts.D3-OTF: Outbound Traffic Filtering.Chinese state actor 'Warp Panda' identified, active since 2022, impacting dozens of US orgs via edge device exploits.
Implement robust network segmentation to prevent threat actors from moving laterally from less secure zones (like a DMZ) to critical internal assets (like domain controllers).
Strictly control and monitor the use of administrative and service accounts, especially on critical infrastructure like vCenter and domain controllers.
Apply egress filtering to block unexpected outbound traffic from servers, which can disrupt C2 communications over non-standard ports or to known malicious destinations.
Keep all internet-facing systems and applications, as well as internal infrastructure like VMware vSphere, fully patched to prevent initial exploitation.
Enforce MFA for all remote access and for all administrative accounts to make credential theft less impactful.
To counter the lateral movement TTPs used by BRICKSTORM's operators, implement strict network isolation and segmentation. Specifically, create firewall rules that explicitly deny all traffic from the DMZ to the internal corporate network, with narrow, well-defined exceptions. RDP traffic (port 3389) from a web server to a domain controller should be completely blocked. Critical infrastructure, including the VMware vCenter management network and domain controllers, should reside in a highly restricted security zone (a 'Tier 0' environment) that is inaccessible from general-purpose servers and user workstations. This architectural control is one of the most effective ways to contain a breach that starts on a public-facing server and prevent it from becoming a full enterprise compromise.
To disrupt BRICKSTORM's C2 communications, especially its use of DoH, implement a policy of default-deny for outbound network traffic from servers. For critical servers like vCenter and domain controllers, all outbound internet access should be blocked unless there is a specific, documented business requirement. For servers that do require internet access, use a forward proxy to explicitly allowlist connections to only known-good domains and IP addresses. This makes it significantly harder for the malware to establish a connection to its C2 server. Additionally, consider blocking DoH traffic at the network perimeter by denying connections to the IP addresses of public DoH resolvers, forcing DNS queries through your monitored, internal DNS servers.
Given the attackers' use of stolen credentials for lateral movement via RDP, enforcing MFA is a critical mitigation. MFA should be mandated for all administrative accounts, including those used to manage VMware vCenter, domain controllers, and ADFS. It should also be required for any form of remote access into the network, such as VPNs. Implementing MFA on RDP sessions for administrators, where possible, provides a strong defense against this specific lateral movement technique. This ensures that even if an attacker compromises a password or service account credential, they cannot use it to access critical systems without a second factor, effectively stopping the attack chain.
In a confirmed incident, PRC actors gained initial access to a victim's web server via a web shell.
CISA, NSA, and the Canadian Centre for Cyber Security release a joint advisory on BRICKSTORM malware.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats