HomeLatest NewsCyber SecurityChinese hackers use BrickStorm malware to dwell in networks for over a year, researchers say

Chinese hackers use BrickStorm malware to dwell in networks for over a year, researchers say

Cybersecurity researchers link BrickStorm campaign to UNC5221, reporting average 393-day network dwell time and theft of source code for identifying zero-day vulnerabilities

Preferred Source of Google

New Delhi — Researchers from Google’s Threat Intelligence Group and have identified a prolonged Chinese cyberespionage campaign in which hackers reportedly remained inside compromised networks for an average of 393 days.

The attackers, linked to a group tracked as UNC5221, used a stealthy backdoor malware known as BrickStorm to collect sensitive information, according to a joint analysis released on Thursday.

The campaign, monitored by Mandiant since March 2025, targeted industries including legal services, software-as-a-service, technology and business process outsourcing.

Advertisement
Saksham Bharat 2026
Saksham Bharat 2026
A multi-stakeholder dialogue on skilling gap in Cybersecurity, Data Resilience and AI — and the roadmap to a Saksham Bharat.
Register Now →
VeeamON 2026 Tour India - Mumbai
VeeamON 2026 Tour India - Mumbai
A VeeamON 2026 India Leadership Series Mumbai for senior public sector and government technology leaders.
Register Now →
Cyber Surakshit Uttar Pradesh
Cyber Surakshit Uttar Pradesh
Find out strategies, frameworks and solutions for building a resilient and secure digital ecosystem across Uttar Pradesh.
Register Now →
VeeamON 2026 Tour India - Bengaluru
VeeamON 2026 Tour India - Bengaluru
A VeeamON 2026 India Leadership Series Bengaluru for senior public sector and government technology leaders.
Register Now →
VeeamON 2026 Tour India - Delhi
VeeamON 2026 Tour India - Delhi
A VeeamON 2026 India Leadership Series Delhi for senior public sector and government technology leaders.
Register Now →
Infosec Reimagined
Infosec Reimagined
Infosec Reimagined 2026 is the premier information security summit where top leaders—CISOs, CROs, CIOs, CTOs and risk executives—converge to redefine cyber resilience.
Register Now →
Digital Senate
Digital Senate
Digital Senate is a premier conference uniting government leaders, technologists and innovators to share ideas, success stories and strategies on digital governance, public sector transformation, cybersecurity and emerging technologies in India.
Register Now →
CIO Prism
CIO Prism
CIO Prism unites forward-thinking technology leaders to exchange transformative insights, shape digital strategies, and foster innovation, empowering enterprises to excel in an era of rapid technological change.
Register Now →

Investigators said the prolonged dwell time made it difficult to determine how the attackers initially accessed networks, though in at least one case the compromise may have involved a zero-day vulnerability in an Ivanti product.

BrickStorm has been deployed on various network appliances, including Linux- and BSD-based devices, many of which do not support conventional endpoint detection tools.

Mandiant noted that UNC5221 frequently targeted VMware vCenter and ESXi servers, often moving laterally from the initially infected appliances using valid credentials likely harvested by the malware.

Advertisement

“The actor moved laterally to a vCenter server in the environment using valid credentials, which were likely captured by the malware running on the network appliances,” Mandiant said in its .

The researchers said the campaign went beyond traditional espionage, with hackers exploiting access to downstream customers of compromised SaaS providers.

According to Charles Carmakal, CTO at Mandiant , Google Cloud, the attackers were using stolen proprietary source code and intellectual property to identify flaws and zero-day vulnerabilities in products.

Advertisement

“As part of this intrusion campaign, the threat actors are stealing proprietary source code and other intellectual property related to enterprise technologies that many other companies use,” Carmakal said.

“We believe the threat actors are analysing the stolen source code to find flaws and zero-day vulnerabilities to exploit in enterprise technology products.”

The researchers emphasised that the group’s activity could have wider implications for organisations relying on the affected enterprise technologies. By discovering and weaponising zero-day vulnerabilities, the attackers could potentially target additional downstream companies.

Mandiant and Google’s Threat Intelligence Group said they continue to track the activity and monitor affected sectors, noting that a Windows variant of the BrickStorm malware has been reported but not observed in their investigations.

Get the day's headlines from Tech Observer straight in your inbox

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
Tech Observer Desk
Tech Observer Desk
Tech Observer Desk at TechObserver.in is a team of technology reporters led by a senior editor who brings latest updates and developments from the world of technology.
- Advertisement -
Powered By Veeam Logo
- Advertisement -

Subscribe to our Newsletter

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
- Advertisement -

AI agents break legacy security models, Veeam CEO warns at VeeamON

Veeam Software CEO Anand Eswaran says zero-trust security models built for human users have broken down as autonomous AI agents move inside enterprises at machine speed, and that recovery, identity and data governance can no longer be treated as separate problems.

RELATED ARTICLES