top of page

Malware BRICKSTORM: Chinese State Hackers Target VMware Systems

  • Dec 7, 2025
  • 2 min read

Key Findings:


  • Cybersecurity agencies in the US and Canada have issued an alert about a new malware called BRICKSTORM, believed to be used by state-sponsored hackers from China.

  • BRICKSTORM is a backdoor that gives attackers stealthy access and control over targeted systems, primarily focusing on VMware vSphere platforms.

  • The hackers have been observed targeting organizations in the Government Services, Facilities, and Information Technology sectors.

  • The malware uses advanced techniques like multi-layer encryption and self-reinstallation to stay undetected for extended periods, sometimes over a year.


Background


BRICKSTORM is a new cybersecurity threat that has been causing concern among major security agencies in the US and Canada. The Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Canadian Centre for Cyber Security (Cyber Centre) have issued a joint alert about this malware, which is believed to be used by state-sponsored hackers from the People's Republic of China (PRC).


Targeting the Virtualization Layer


According to the expert analysis, what makes BRICKSTORM particularly alarming is that it targets the virtualization layer, specifically the VMware vSphere platforms, rather than individual operating systems or applications. By compromising the management console (vCenter), the attackers can gain broad visibility and control over the entire virtual infrastructure, bypassing many traditional endpoint defenses.


Sophisticated Techniques for Persistence and Stealth


BRICKSTORM employs advanced techniques to ensure its persistence and stealthy operation. The malware uses multiple layers of encryption to hide its communication with the hackers' command and control centers, making it extremely difficult to detect. Additionally, it has a built-in function to automatically reinstall itself if interrupted, ensuring its continued presence on the compromised systems.


Prolonged Presence and Targeted Sectors


The agencies have observed the BRICKSTORM activity lasting from April 2024 to at least September 2025, indicating the hackers' ability to maintain persistent access to the targeted systems. The primary focus of these attacks has been on organizations in the Government Services, Facilities, and Information Technology sectors, which are considered critical infrastructure.


Call for Vigilance and Immediate Action


The security agencies are urging all affected organizations to use the newly released indicators of compromise (IOCs) and detection signatures to check their systems for any signs of BRICKSTORM activity. They also emphasize the importance of immediate reporting of any detected incidents to aid in the ongoing investigation and mitigation efforts.


Sources


  • https://hackread.com/chinese-state-hackers-brickstorm-vmware-systems/

  • https://x.com/HackRead/status/1997295589831381069

  • https://www.govinfosecurity.com/brickstorm-malware-hits-us-critical-systems-cisa-warns-a-30195

  • https://www.instagram.com/p/DR4FULTD8L8/

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page