US and Canadian Authorities Confirm China-Led Malware Attack on Government Entities
A sophisticated cyber attack targeting government entities and tech companies, attributed to Chinese hackers, has been confirmed by the US and Canadian authorities. The malware, dubbed "Brickstorm," was used by state-sponsored attackers to gain long-term access to internal networks of affected organizations.
The attackers, who are believed to be linked to China, exploited vulnerabilities in VMware vSphere cloud computing platforms to gain a foothold in targeted systems. This backdoor allowed them to steal sensitive information, manipulate files, and create hidden virtual machines, effectively taking control without detection.
According to reports from the Canadian Centre for Cyber Security and cybersecurity agencies, the attack could have begun as early as April 2024 and continued until at least September of this year. The attackers used eight different variants of Brickstorm malware, which were analyzed by experts.
The attack has raised concerns among government officials and tech companies, with VMware's parent company, Broadcom, urging its customers to update their security patches immediately. The Google Threat Intelligence Group also issued a warning, advising organizations to reevaluate their threat models and conduct hunting exercises against specified threat actors.
While the exact number of targeted entities remains unclear, the incident highlights the growing threat of state-sponsored hacking and the need for increased vigilance among government agencies and tech companies.
A sophisticated cyber attack targeting government entities and tech companies, attributed to Chinese hackers, has been confirmed by the US and Canadian authorities. The malware, dubbed "Brickstorm," was used by state-sponsored attackers to gain long-term access to internal networks of affected organizations.
The attackers, who are believed to be linked to China, exploited vulnerabilities in VMware vSphere cloud computing platforms to gain a foothold in targeted systems. This backdoor allowed them to steal sensitive information, manipulate files, and create hidden virtual machines, effectively taking control without detection.
According to reports from the Canadian Centre for Cyber Security and cybersecurity agencies, the attack could have begun as early as April 2024 and continued until at least September of this year. The attackers used eight different variants of Brickstorm malware, which were analyzed by experts.
The attack has raised concerns among government officials and tech companies, with VMware's parent company, Broadcom, urging its customers to update their security patches immediately. The Google Threat Intelligence Group also issued a warning, advising organizations to reevaluate their threat models and conduct hunting exercises against specified threat actors.
While the exact number of targeted entities remains unclear, the incident highlights the growing threat of state-sponsored hacking and the need for increased vigilance among government agencies and tech companies.