CISA, NSA, and Canadian Cyber Centre Issue Joint Advisory on 'BRICKSTORM' Malware Used by PRC State-Sponsored Actors

CISA Exposes 'BRICKSTORM' Backdoor Used by Chinese State Actors to Infiltrate US Government

HIGH
December 4, 2025
December 5, 2025
6m read
Threat ActorMalwareCyberattack

Related Entities(initial)

Threat Actors

People's Republic of China (PRC) state-sponsored cyber actors

Organizations

CISA NSA Canadian Centre for Cyber SecurityVMware

Products & Tech

VMware vSphere Windows Active Directory Federation Services (ADFS)

Other

BRICKSTORM

Full Report(when first published)

Executive Summary

On December 4, 2025, a coalition of top Western cybersecurity agencies—the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Canadian Centre for Cyber Security—released a joint advisory and detailed malware analysis report on a sophisticated backdoor dubbed BRICKSTORM. The report attributes the malware to People's Republic of China (PRC) state-sponsored threat actors. These actors are leveraging BRICKSTORM to establish long-term, persistent access within compromised networks, with a primary focus on Government Services and Information Technology sectors. The malware is notable for its advanced stealth capabilities, including the use of DNS-over-HTTPS (DoH) for C2 communications and a self-healing mechanism to ensure persistence. The advisory provides indicators of compromise (IOCs) and TTPs to help organizations hunt for and defend against this threat.


Threat Overview

BRICKSTORM is a versatile and stealthy backdoor engineered for both VMware vSphere and Microsoft Windows environments. Its core purpose is to provide the threat actor with persistent, covert access to a target's network. The PRC state-sponsored actors behind this campaign have demonstrated a patient, multi-stage attack methodology.

The typical attack chain observed by CISA involves:

  1. Initial Access: Gaining a foothold on a public-facing web server, often within a DMZ, through the deployment of a web shell.
  2. Credential Access & Discovery: Stealing service account credentials from the compromised web server.
  3. Lateral Movement: Using the stolen credentials to move laterally into the internal network via protocols like Remote Desktop Protocol (RDP).
  4. Privilege Escalation & Persistence: Compromising a high-value target like a VMware vCenter server to deploy the BRICKSTORM malware, and then using that access to compromise domain controllers and ADFS servers.
  5. Collection: Exfiltrating sensitive data, such as cryptographic keys from an ADFS server, to enable further access and impersonation.

This methodical approach allows the actors to embed themselves deep within a network, often going undetected for long periods.

Technical Analysis

The BRICKSTORM malware exhibits several advanced technical features designed for stealth and resilience:

  • Encrypted C2 Communications: It uses multiple layers of encryption to hide its command-and-control traffic. This includes standard HTTPS and WebSockets, often with an additional, nested layer of TLS encryption.
  • DNS-over-HTTPS (DoH): To further obfuscate C2 communications, BRICKSTORM uses DoH. This technique tunnels DNS queries through encrypted HTTPS traffic, making it difficult for network defenders to block C2 domains or identify malicious traffic using traditional DNS monitoring. This aligns with MITRE ATT&CK technique T1071.004 - Application Layer Protocol: DNS-over-HTTPS.
  • SOCKS Proxy Functionality: Certain variants of the malware can act as a SOCKS proxy, enabling the attacker to tunnel other traffic through the compromised host. This is a common method for lateral movement and accessing internal resources, as described in T1090 - Proxy.
  • Self-Healing Persistence: The malware includes a self-monitoring function. If the backdoor process is terminated or its persistence mechanism is removed, it can automatically reinstall and restart itself, making remediation more challenging. This corresponds to T1543 - Create or Modify System Process.

Impact Assessment

A successful BRICKSTORM intrusion can have severe consequences for an organization. The primary impact is the establishment of a long-term, persistent foothold by a sophisticated state-sponsored actor. This access can be used for:

  • Espionage: Ongoing theft of sensitive government, corporate, or personal data.
  • Sabotage: In critical infrastructure environments, this level of access could potentially be used to disrupt or disable operational technology (OT) systems.
  • Supply Chain Attacks: By compromising IT service providers, the actors can pivot to attack their downstream customers.
  • Credential Theft: Compromising domain controllers and ADFS servers allows for widespread credential harvesting, which can be used to compromise the entire enterprise and associated cloud environments.

The targeting of VMware vCenter is particularly damaging, as it provides the attackers with control over the virtualized infrastructure, allowing them to create, modify, or delete virtual machines at will.

Detection & Response

  • Network Monitoring: Monitor for DNS-over-HTTPS (DoH) traffic to non-standard resolvers. While legitimate services use DoH, traffic from servers (especially domain controllers or vCenter) to unknown DoH providers is highly suspicious. D3FEND's D3-NTA: Network Traffic Analysis is essential.
  • Log Analysis: Correlate web server logs with authentication logs. Look for RDP connections originating from DMZ web servers to internal assets like domain controllers, which is a major red flag. Analyze Windows Event Logs for signs of credential theft (Event ID 4624 with Logon Type 3) and service creation (Event ID 7045).
  • VMware vSphere Monitoring: Enable and monitor vCenter logs for unusual API calls, VM modifications, or logins from unexpected sources. D3FEND's D3-LAM: Local Account Monitoring should be applied to vCenter accounts.
  • Threat Hunting: Proactively hunt for the IOCs provided in the CISA advisory (AR25-339A). Search for the file names, hashes, and C2 domains associated with BRICKSTORM.

Mitigation

  1. Harden Internet-Facing Systems: Apply patches for all public-facing applications and systems. Implement a WAF to protect against web shell deployment. Restrict access to management interfaces.
  2. Network Segmentation: Segment networks to prevent easy lateral movement from the DMZ to the internal corporate network. RDP access from the DMZ to domain controllers should be strictly prohibited.
  3. Privileged Access Management: Tightly control access to critical systems like domain controllers and vCenter. Implement multi-factor authentication (MFA) for all administrative accounts.
  4. Limit Outbound Traffic: Implement an egress filtering policy to block outbound connections from servers to the internet on all but explicitly allowed ports and destinations. This can disrupt C2 communications. This is an application of D3FEND's D3-OTF: Outbound Traffic Filtering.

Timeline of Events

1
April 11, 2024
In a confirmed incident, PRC actors gained initial access to a victim's web server via a web shell.
2
December 4, 2025
CISA, NSA, and the Canadian Centre for Cyber Security release a joint advisory on BRICKSTORM malware.
3
December 4, 2025
This article was published

Article Updates

December 5, 2025

Chinese state actor 'Warp Panda' identified, active since 2022, impacting dozens of US orgs via edge device exploits.

MITRE ATT&CK Mitigations

Implement robust network segmentation to prevent threat actors from moving laterally from less secure zones (like a DMZ) to critical internal assets (like domain controllers).

Strictly control and monitor the use of administrative and service accounts, especially on critical infrastructure like vCenter and domain controllers.

Apply egress filtering to block unexpected outbound traffic from servers, which can disrupt C2 communications over non-standard ports or to known malicious destinations.

Keep all internet-facing systems and applications, as well as internal infrastructure like VMware vSphere, fully patched to prevent initial exploitation.

Enforce MFA for all remote access and for all administrative accounts to make credential theft less impactful.

D3FEND Defensive Countermeasures

To counter the lateral movement TTPs used by BRICKSTORM's operators, implement strict network isolation and segmentation. Specifically, create firewall rules that explicitly deny all traffic from the DMZ to the internal corporate network, with narrow, well-defined exceptions. RDP traffic (port 3389) from a web server to a domain controller should be completely blocked. Critical infrastructure, including the VMware vCenter management network and domain controllers, should reside in a highly restricted security zone (a 'Tier 0' environment) that is inaccessible from general-purpose servers and user workstations. This architectural control is one of the most effective ways to contain a breach that starts on a public-facing server and prevent it from becoming a full enterprise compromise.

To disrupt BRICKSTORM's C2 communications, especially its use of DoH, implement a policy of default-deny for outbound network traffic from servers. For critical servers like vCenter and domain controllers, all outbound internet access should be blocked unless there is a specific, documented business requirement. For servers that do require internet access, use a forward proxy to explicitly allowlist connections to only known-good domains and IP addresses. This makes it significantly harder for the malware to establish a connection to its C2 server. Additionally, consider blocking DoH traffic at the network perimeter by denying connections to the IP addresses of public DoH resolvers, forcing DNS queries through your monitored, internal DNS servers.

Given the attackers' use of stolen credentials for lateral movement via RDP, enforcing MFA is a critical mitigation. MFA should be mandated for all administrative accounts, including those used to manage VMware vCenter, domain controllers, and ADFS. It should also be required for any form of remote access into the network, such as VPNs. Implementing MFA on RDP sessions for administrators, where possible, provides a strong defense against this specific lateral movement technique. This ensures that even if an attacker compromises a password or service account credential, they cannot use it to access critical systems without a second factor, effectively stopping the attack chain.

Timeline of Events

1
April 11, 2024

In a confirmed incident, PRC actors gained initial access to a victim's web server via a web shell.

2
December 4, 2025

CISA, NSA, and the Canadian Centre for Cyber Security release a joint advisory on BRICKSTORM malware.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

BRICKSTORMCISANSAPRCChinaState-SponsoredBackdoorVMwareThreat Actor

📢 Share This Article

Help others stay informed about cybersecurity threats