Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors

    Date: 10/09/2025

    Severity: Critical

    Summary

    We are tracking BRICKSTORM malware, used to maintain long-term access to U.S. organizations. Since March 2025, Team Consulting has responded to intrusions in sectors like legal, SaaS, BPOs, and tech. The targets likely support zero-day development and serve as pivot points to broader victims. We attribute this activity to UNC5221 and related China-nexus clusters with advanced capabilities. Their operations exploit zero-days and evade detection by targeting network appliances lacking EDR support. BRICKSTORM modifications and stealthy techniques have allowed access to persist for an average of 393 days.

    Indicators of Compromise (IOC) List

    Hash : 

    90b760ed1d0dcb3ef0f2b6d6195c9d852bcb65eca293578982a8c4b64f51b035

    2388ed7aee0b6b392778e8f9e98871c06499f476c9e7eae6ca0916f827fe65df

    aa688682d44f0c6b0ed7f30b981a609100107f2d414a3a6e5808671b112d1878

    123e80a34508c4dede7cc70e76931fcc

    84b573305b732a8372a082c057242953

    b1b7aaa5bd4408a4d3003a9fabcdd041

    130fdc32de36a362e65c7138b560eb8d8f6ae599

    b8eed63ab9cbdca494f26a6f66bfd4a0a693b3f0

    f1f64ed1ee74d3b84f338a612e59c81997d6f70e

    Gurucul Threat Detection and Incident Response (TDIR) Queries for Detection

    Detection Query 1 : 

    md5hash IN ("b1b7aaa5bd4408a4d3003a9fabcdd041","123e80a34508c4dede7cc70e76931fcc","84b573305b732a8372a082c057242953")

    Detection Query 2 : 

    sha1hash IN ("130fdc32de36a362e65c7138b560eb8d8f6ae599","f1f64ed1ee74d3b84f338a612e59c81997d6f70e","b8eed63ab9cbdca494f26a6f66bfd4a0a693b3f0")

    Detection Query 3 : 

    sha256hash IN ("2388ed7aee0b6b392778e8f9e98871c06499f476c9e7eae6ca0916f827fe65df","90b760ed1d0dcb3ef0f2b6d6195c9d852bcb65eca293578982a8c4b64f51b035","aa688682d44f0c6b0ed7f30b981a609100107f2d414a3a6e5808671b112d1878")

    Reference:

    https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign 

    https://www.jdsupra.com/legalnews/brickstorm-china-linked-hackers-lurk-5228266/


    Tags

    MalwareVulnerabilityThreat ActorBRICKSTORMUNC5221China-NexusUnited StatesSaasBPOInformation TechnologyZero-dayExploitBackdoorCyber Espionage

    « Previous ArticleNext Article »

    Comments

    No records to display

    Looking for Something?
    Threat Research Categories:
    Tags