US and Canadian Agencies Confirm Chinese Hackers' Use of Advanced Malware 'Brickstorm'
A recent report from the Canadian Centre for Cyber Security has confirmed that hackers linked to China have successfully infiltrated several government entities and tech organizations by exploiting a sophisticated malware known as "Brickstorm". The backdoor-based attack, which utilized the VMware vSphere cloud computing platform, granted the attackers prolonged access to internal networks, enabling them to steal sensitive credentials, manipulate files, create hidden virtual machines, and ultimately exert control over the compromised systems.
According to the report, the attack may have started as early as April 2024 and continued until at least September of this year. The exact number of targeted organizations is unknown, but experts have identified eight different Brickstorm malware samples. VMware vSphere owner Broadcom has acknowledged the alleged hack, urging its customers to download up-to-date security patches to prevent similar incidents.
In a related development, the Google Threat Intelligence Group published a report on Brickstorm in September, warning organizations to reassess their threat models for appliances and conduct targeted exercises against known threat actors. As cyber threats continue to evolve, experts emphasize the importance of proactive measures to protect sensitive information and systems from sophisticated malware attacks like Brickstorm.
A recent report from the Canadian Centre for Cyber Security has confirmed that hackers linked to China have successfully infiltrated several government entities and tech organizations by exploiting a sophisticated malware known as "Brickstorm". The backdoor-based attack, which utilized the VMware vSphere cloud computing platform, granted the attackers prolonged access to internal networks, enabling them to steal sensitive credentials, manipulate files, create hidden virtual machines, and ultimately exert control over the compromised systems.
According to the report, the attack may have started as early as April 2024 and continued until at least September of this year. The exact number of targeted organizations is unknown, but experts have identified eight different Brickstorm malware samples. VMware vSphere owner Broadcom has acknowledged the alleged hack, urging its customers to download up-to-date security patches to prevent similar incidents.
In a related development, the Google Threat Intelligence Group published a report on Brickstorm in September, warning organizations to reassess their threat models for appliances and conduct targeted exercises against known threat actors. As cyber threats continue to evolve, experts emphasize the importance of proactive measures to protect sensitive information and systems from sophisticated malware attacks like Brickstorm.