China Espionage Threat: BRICKSTORM Malware Targets Tech and Legal Sectors

BRICKSTORM malware China espionage cybersecurity threats UNC5221 Zero-Trust architecture malware analysis data exfiltration
Jim Gagnard
Jim Gagnard

Board Advisor

 
December 5, 2025 4 min read
China Espionage Threat: BRICKSTORM Malware Targets Tech and Legal Sectors

TL;DR

This article delves into a sophisticated China-linked espionage campaign utilizing the BRICKSTORM backdoor. It details how attackers achieve persistent access, target legal, SaaS, and tech firms, and exfiltrate sensitive data. The analysis covers BRICKSTORM's technical capabilities, including its SOCKS proxy functionality and evasion tactics, and provides crucial recommendations for organizations to detect and defend against such advanced threats.

China-Linked Espionage Campaign Leverages BRICKSTORM Malware

A sophisticated, suspected China-nexus espionage campaign is utilizing the BRICKSTORM backdoor to maintain persistent access to victim organizations in the United States. The Google Threat Intelligence Group (GTIG) has been tracking this activity, attributing it to UNC5221, a group known for exploiting zero-day vulnerabilities.

The campaign's targets include legal services, Software as a Service (SaaS) providers, Business Process Outsourcers (BPOs), and technology firms. According to Mandiant, the value of these targets extends beyond typical espionage, potentially providing data for zero-day exploit development and broader access to downstream victims.

BRICKSTORM Backdoor Details

BRICKSTORM is a Go-based backdoor that has been observed maintaining persistence in victim organizations since March 2025. It features SOCKS proxy functionality and cross-platform support, enabling deployment on appliances that lack traditional endpoint detection and response (EDR) tools. The malware can act as a web server, manipulate the file system, upload/download files, execute shell commands, and perform SOCKS proxy relaying, relying on WebSockets for command and control (C2) communications.

Mandiant reports that BRICKSTORM intrusions often go undetected for an average of 393 days, obscuring the initial attack vector. The attackers focus on compromising perimeter and remote access systems, sometimes exploiting zero-day vulnerabilities. Notably, BRICKSTORM deployments are often designed to blend in with the target appliance, mimicking legitimate activity.

Technical Analysis of BRICKSTORM

Analysis of samples recovered from different victim organizations indicates active development of BRICKSTORM. Some samples are obfuscated using Garble, and some carry a new version of the custom wssoft library. One sample included a "delay" timer, waiting for a hard-coded date months in the future before beaconing to the C2 domain.

The threat actor has also created a web shell, tracked as SLAYSTYLE, on vCenter servers. SLAYSTYLE, also known as BEEFLUSH , is a JavaServer Pages (JSP) web shell that functions as a backdoor, designed to receive and execute arbitrary operating system commands passed through an HTTP request.

Escalating Privileges and Lateral Movement

In one investigation, Mandiant analyzed a vCenter server and found that the threat actor installed a malicious Java Servlet filter, tracked as BRICKSTEAL, for the Apache Tomcat server. BRICKSTEAL runs on HTTP requests to the vCenter web login Uniform Resource Indicators (URIs) /web/saml2/sso/*. If present, it decodes the HTTP Basic authentication header, potentially capturing usernames and passwords.

The attackers also used legitimate admin accounts to move laterally, accessing systems like Delinea (formerly Thycotic) Secret Server to dump and decrypt stored credentials. They installed BRICKSTORM on appliances by enabling SSH via VAMI, then ensured persistence by editing startup scripts.

Mission Objectives and Data Exfiltration

The primary goal of the attacks is the exfiltration of emails. Attackers make use of Microsoft Entra ID Enterprise Applications with mail.read or full_access_as_app scopes to access email mailboxes of interest. According to Google's report, the threat actor targets mailboxes of developers, system administrators, and individuals involved in matters aligning with PRC economic and espionage interests.

Asset inventory

Image courtesy of Google Cloud Blog

When exfiltrating files, the attackers use the SOCKS proxy feature of BRICKSTORM to tunnel their workstation and directly access systems and web applications of interest.

Gopher Security: Protecting Against Advanced Threats

In light of these sophisticated threats, Gopher Security offers an AI-powered, post-quantum Zero-Trust cybersecurity architecture designed to protect organizations from advanced persistent threats like BRICKSTORM. Our platform converges networking and security across all environments, using peer-to-peer encrypted tunnels and quantum-resistant cryptography.

The Gopher Security platform is uniquely positioned to defend against threats that target edge devices and cloud infrastructure, providing:

  • AI-Powered Threat Detection: Advanced AI algorithms to identify and neutralize threats in real-time.
  • Zero-Trust Architecture: Ensures that every device, user, and application is authenticated and authorized before accessing resources.
  • Post-Quantum Cryptography: Protects data against current and future quantum computing threats.
  • Comprehensive Visibility: Provides a unified view of network activity, enabling proactive threat hunting and incident response.

Recommendations

Mandiant recommends organizations conduct thorough threat hunts to detect BRICKSTORM and related activities. Key steps include:

  1. Create or update asset inventory: Include edge devices and appliances.
  2. File and backup scan: Scan for BRICKSTORM using YARA rules.
  3. Monitor internet traffic: Analyze traffic from edge devices and appliances for suspicious activity.
  4. Review access to Windows systems: Investigate connections from appliances to Windows servers and desktops.
  5. Analyze access to credentials and secrets: Use forensic tools to identify suspicious activity related to credential access.
  6. Monitor access to M365 mailboxes: Look for unauthorized access via Enterprise Applications.
  7. Investigate cloning of sensitive virtual machines: Review vSphere VPXD logs for suspicious cloning activity.
  8. Monitor creation of local vCenter and ESXi accounts: Review VMware audit events for unauthorized account creation.
  9. Detect rogue VMs: Identify unauthorized virtual machines in VMware environments.

To proactively defend against sophisticated espionage campaigns, organizations should consider implementing a Zero-Trust architecture with post-quantum cryptography. Gopher Security provides the tools and expertise needed to enhance your cybersecurity posture and protect against emerging threats.

Call to Action

Enhance your organization's cybersecurity with Gopher Security's AI-powered, post-quantum Zero-Trust architecture. Contact us today to learn how we can help you protect against advanced threats like BRICKSTORM.

Jim Gagnard
Jim Gagnard

Board Advisor

 

30-year CEO experiences of leading multiple $MM exits. Excellent operator of managing big enterprise companies.

Related News

AI-Driven Cybersecurity Innovations: The Future of Threat Prevention
AI agents security

AI-Driven Cybersecurity Innovations: The Future of Threat Prevention

AI agents are prime targets for cyberattacks. Discover evolving threats like prompt injection & AI-powered exploits, and learn how to fortify your defenses. Read now!

By Brandon Woo January 22, 2026 5 min read
common.read_full_article
GootLoader Malware Evades Detection Using Nested ZIP Archives
GootLoader

GootLoader Malware Evades Detection Using Nested ZIP Archives

GootLoader is back with advanced tricks, using malformed ZIPs to bypass security & target businesses. Learn how to detect and defend against this threat. Protect your assets!

By Edward Zhou January 21, 2026 3 min read
common.read_full_article
WhisperPair Vulnerability: Millions of Bluetooth Devices at Risk
WhisperPair attack

WhisperPair Vulnerability: Millions of Bluetooth Devices at Risk

Millions of Bluetooth audio devices are at risk from the WhisperPair vulnerability. Learn how attackers can eavesdrop and track your devices, and what you can do to protect yourself. Update your firmware now!

By Jim Gagnard January 20, 2026 3 min read
common.read_full_article
Tech Hiring Growth: 12-15% Increase in AI and Data Jobs by 2026
India tech job market

Tech Hiring Growth: 12-15% Increase in AI and Data Jobs by 2026

India's tech job market is set for a 12-15% surge in 2026, creating 1.25 lakh roles. Discover key sectors and skills in demand. Read more!

By Edward Zhou January 19, 2026 3 min read
common.read_full_article