CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed new information about a backdoor called BRICKSTORM. This backdoor has been employed by state-sponsored hackers from the People’s Republic of China (PRC) to maintain prolonged access to compromised systems. According to CISA, BRICKSTORM is a highly sophisticated tool designed to infiltrate VMware vSphere and Windows environments.

This revelation highlights the ongoing cyber threats posed by PRC-affiliated threat actors targeting critical infrastructure and organizations in the United States. The use of BRICKSTORM allows these hackers to establish long-term persistence, meaning they can remain undetected within networks for extended periods. This capability poses significant risks to the security and integrity of affected systems.

Details on BRICKSTORM and Its Capabilities

CISA described BRICKSTORM as a complex backdoor that specifically targets VMware vSphere, a widely used virtualization platform, as well as Windows operating systems. By exploiting these environments, the PRC hackers can gain deep access to network resources and maintain control over compromised machines.

The backdoor’s sophistication enables it to evade detection by traditional security measures. This stealthy nature allows the attackers to operate covertly, gathering intelligence or preparing for further malicious activities. The agency’s report underscores the advanced techniques employed by these state-sponsored actors to sustain their presence within targeted networks.

Implications of CISA Reports PRC Hackers Using BRICKSTORM

The disclosure by CISA serves as a warning to organizations across the United States about the persistent cyber threats originating from PRC-backed groups. The ability of these hackers to use BRICKSTORM for long-term access means that affected systems could be compromised for months or even years without detection.

Organizations relying on VMware vSphere and Windows environments are particularly vulnerable to this threat. CISA’s report encourages heightened vigilance and the implementation of robust cybersecurity measures to detect and mitigate such backdoors. Understanding the tactics and tools used by these threat actors is crucial for defending against ongoing and future cyber intrusions.

In summary, CISA reports PRC hackers have deployed the BRICKSTORM backdoor to maintain long-term access to U.S. systems. This sophisticated malware targets VMware and Windows platforms, enabling stealthy and persistent control. The agency’s findings emphasize the need for continuous monitoring and enhanced security practices to protect critical infrastructure from state-sponsored cyber threats.

For more stories on this topic, visit our category page.

Source: original article.

Avatar

By Futurete

My name is Go Ka, and I’m the founder and editor of Future Technology X, a news platform focused on AI, cybersecurity, advanced computing, and future digital technologies. I track how artificial intelligence, software, and modern devices change industries and everyday life, and I turn complex tech topics into clear, accurate explanations for readers around the world.