Close Menu
  • Breaking News
  • Business
  • Career
  • Sports
  • Climate
  • Science
    • Tech
  • Culture
  • Health
  • Lifestyle
  • Facebook
  • Instagram
  • TikTok
Categories
  • Breaking News (6,591)
  • Business (349)
  • Career (5,247)
  • Climate (233)
  • Culture (5,164)
  • Education (5,512)
  • Finance (250)
  • Health (928)
  • Lifestyle (4,906)
  • Science (5,181)
  • Sports (378)
  • Tech (196)
  • Uncategorized (1)
Hand Picked

Japan beat Australia to lift Women’s Asian Cup title | Football News

March 21, 2026

U.K. says Iran unsuccessfully targeted Diego Garcia base

March 21, 2026

Police groups call on Travis County DA Jose Garza to resign over misconduct

March 21, 2026

Trump hints at ‘winding down’ Iran war as US deploys more troops to region | US-Israel war on Iran News

March 21, 2026
Facebook X (Twitter) Instagram
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy
  • Terms and services
Facebook X (Twitter) Instagram
onlyfacts24
  • Breaking News

    Japan beat Australia to lift Women’s Asian Cup title | Football News

    March 21, 2026

    U.K. says Iran unsuccessfully targeted Diego Garcia base

    March 21, 2026

    Police groups call on Travis County DA Jose Garza to resign over misconduct

    March 21, 2026

    Trump hints at ‘winding down’ Iran war as US deploys more troops to region | US-Israel war on Iran News

    March 21, 2026

    As Trump eyes Cuba, I remember me how different things used to be

    March 21, 2026
  • Business

    Affordability Strategies for Family-Owned Businesses Topic for March 17 Meeting with Members of Congressional Family Business Caucus

    February 21, 2026

    Here’s what’s opening between Hot Topic and Perfume Palace at York Galleria

    February 21, 2026

    When Machines Start Making Music in Taiwan

    February 10, 2026

    ‘A very relevant topic for our businesses’: Weyburn Chamber’s Lunch & Learn – DiscoverWeyburn.com

    February 4, 2026

    ‘A very relevant topic for our businesses’: Weyburn Chamber’s Lunch & Learn – DiscoverWeyburn.com

    February 3, 2026
  • Career

    The Killeen Daily HeraldWhy adults pursuing career growth or personal interests are the 'new majority' studentMillions of adults are continuing their education by returning to school and enrolling in credit and non-credit courses, certificates,….8 hours ago

    February 23, 2026

    Warren County man finds dream career through hands‑on apprenticeship

    February 23, 2026

    Northeast Mississippi Daily JournalWhy adults pursuing career growth or personal interests are the 'new majority' studentMillions of adults are continuing their education by returning to school and enrolling in credit and non-credit courses, certificates,….5 hours ago

    February 23, 2026

    Deandre Ayton Calls Lob From LeBron James One Of Top Highlights Of Career

    February 23, 2026

    Auburn Career Center expanding cosmetology program for 2026-2027

    February 23, 2026
  • Sports

    OKC Thunder Guard Nikola Topic Makes Debut for OKC Blue

    February 22, 2026

    The Daily Mania: Off-Topic Open Thread – Feb 19, 2026

    February 22, 2026

    Ex-NBA first-round pick Nikola Topic makes Thunder debut after battling cancer

    February 21, 2026

    Thunder’s Nikola Topic: Scores two points in NBA debut

    February 21, 2026

    fox23.comTopic NBA debut spoiled in Thunder loss to BucksTopic NBA debut spoiled in Thunder loss to Bucks. Feb 12, 2026; Feb 12, 2026. Facebook · Twitter · WhatsApp · SMS · Email; Print; Copy article link.1 week ago

    February 20, 2026
  • Climate

    PA Environment & Energy Articles & NewsClips By Topic

    February 10, 2026

    Youth and the Environment – Geneva Environment Network

    January 30, 2026

    PA Environment & Energy Articles & NewsClips By Topic

    January 26, 2026

    PA Environment Digest BlogStories You May Have Missed Last Week: PA Environment & Energy Articles & NewsClips By TopicPA Environment Digest Puts Links To The Best Environment & Energy Articles and NewsClips From Last Week Here By Topic–..1 day ago

    January 18, 2026

    The Providence JournalWill the environment be a big topic during the legislative session? What to expectEnvironmental advocates are grappling with how to meet the state's coming climate goals..1 day ago

    January 13, 2026
  • Science
    1. Tech
    2. View All

    Claude Cowork Triggers Tech Stock Selloff as AI Threatens SaaS Business Models

    February 23, 2026

    Tech Topics For Task 2 Success

    February 22, 2026

    These defense tech topics are trending • Table.Briefings

    February 20, 2026

    Essex Tech a topic of conversation in Lynnfield

    February 20, 2026

    Astronomers Have Uncovered a Mysterious Ultra-High Energy Gamma Ray Source in Space

    February 23, 2026

    Webb Just Spent 17 Hours Staring at Uranus—and Found Its Auroras Are Even Weirder Than We Thought

    February 23, 2026

    Rule-breaking black hole found growing at 13 times the cosmic ‘speed limit,’ challenging theories

    February 23, 2026

    How to View the ‘Blood Moon’ Total Lunar Eclipse on March 3

    February 23, 2026
  • Culture

    Pope, Curia begin Lenten retreat | News Headlines

    February 23, 2026

    Food, company, culture: World Banquet 2026 | News

    February 23, 2026

    MPR NewsThousands celebrate Lunar New Year, Chinese culture at Mall of America honoring the Year of the HorseMinnesotans enjoyed performances showcasing Chinese traditional dances, instrumental music and singing at the Mall of America for the Lunar….12 minutes ago

    February 23, 2026

    Area pop culture fans attend final day of NEPA Comic Con

    February 23, 2026

    VinylCon! makes Atlanta debut with two-day record fair at Yaarab Shrine Center

    February 23, 2026
  • Health

    Military Health System’s Mental Health Hub: Your Source for Support

    February 9, 2026

    Plant health | EFSA

    February 8, 2026

    Welding Fumes and Manganese | Welding

    February 6, 2026

    Rural Health Transformation Program Topic of Monthly Hospital Board Meeting

    February 3, 2026

    Medical evacuations out of U.S. Central and U.S. Africa Commands among the active and reserve components of the U.S. Armed Forces, 2024

    January 30, 2026
  • Lifestyle
Contact
onlyfacts24
Home»Tech»Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
Tech

Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors

November 14, 2025No Comments
Facebook Twitter Pinterest LinkedIn Tumblr Email
03 ThreatIntelligenceWebsiteBannerIdeas BA.max 2600x2600.png
Share
Facebook Twitter LinkedIn Pinterest Email

File and Backup Scan for BRICKSTORM

YARA rules have proven to be the most effective method for detecting BRICKSTORM binaries on appliances. We are sharing relevant YARA rules in the appendix section of this post. Yara can be difficult to run at scale, but some backup solutions provide the ability to run YARA across the backup data store. Mandiant is aware of multiple customers who have identified BRICKSTORM through this method. 

To aid organizations in hunting for BRICKSTORM activity in their environments, Mandiant released a scanner script, which can run on appliances and other Linux or BSD-based systems. 

Internet Traffic from Edge Devices and Appliances

Use the inventory of appliance management IP addresses to hunt for evidence of malware beaconing in network logs. In general, appliances should not communicate with the public Internet from management IP addresses except to download updates and send crash analytics to the manufacturer. 

Established outbound traffic to domains or IP addresses not controlled by the appliance manufacturer should be regarded as very suspicious and warranting forensic review of the appliance. BRICKSTORM can use DNS over HTTP (DoH), which should be similarly rare when sourced from appliance management IP addresses.

Access to Windows Systems from Appliances

The threat actor primarily accessed Windows machines (both desktops and servers) using type 3 (network) logins, although in some cases the actor also established RDP sessions. Appliances should rarely log in to Windows desktops or servers and any connections should be treated as suspicious. Some examples of false positives could include VPN appliances using a known service account to connect to a domain controller in order to perform LDAP lookups and authenticated vulnerability scanners using a well-known service account. 

In addition to EDR telemetry, Terminal Services logs and Security event logs, defenders should obtain and parse the Windows User Access Log (UAL). The UAL is stored on Windows Servers inside the directory Windows\System32\LogFiles\Sum and can be parsed using open-source tools such as SumECmd. This log source records attempted authenticated connections to Windows systems and often retains artifacts going back much longer than typical Windows event logs. Note that this log source includes successful and unsuccessful logins, but is still useful to identify suspicious activity sourced from appliances.

Access to Credentials and Secrets

Use the forensic capabilities of EDR tools to acquire Windows Shellbags artifacts from Windows workstations and servers. Shellbags records folder paths that are browsed by a user with the Windows Explorer application. Use an open-source parser to extract the relevant data and look for patterns of activity that are suspicious:

  • Access to folder paths where the initiating user is a service account, especially service accounts that are unfamiliar or rarely used

  • File browsing activity sourced from servers that include a Windows Universal Naming Convention (UNC) path that points to a workstation (e.g., \\bobwin7.corp.local\browsing\path)

  • File browsing activity to folder paths that contain credential data, such as:

    • Browser profile paths (e.g., %appdata%\Mozilla\Firefox\Profiles)

    • Appdata locations used to store session tokens (e.g., Users\\.azure\)

    • Windows credential vault (%appdatalocal%\Microsoft\Credentials)

    • Data Protection API (DPAPI) keys (%appdata%\Microsoft\Protect\\)

Access to M365 Mailboxes using Enterprise Application

Mandiant has observed this actor use common techniques to conduct bulk email access and exfiltration from Microsoft 365 Exchange Online. Organizations should follow our guidance outlined in our APT29 whitepaper to hunt for these techniques. Although the white paper specifically references APT29, these techniques have become widely used by many groups. In multiple investigations the threat actor used a Microsoft Entra ID Enterprise Application with mail.read or full_access_as_app scopes to access mailboxes of key individuals in the victim organization.

To hunt for this activity, we recommend a phased approach:

  1. Enumerate the Enterprise Applications and Application Registrations with graph permissions that can read all mail.

  2. For each application, validate that there is at least one secret or certificate configured for it. Record the Application (client) ID

  3. Conduct a free text search against the Unified Audit Log or the OfficeActivity table in Sentinel for the client IDs from step 2. This will return the mailitemsaccessed events that recorded the application accessing mail.

  4. For each application analyze the source IP addresses and user-agent strings for discrepancies. Legitimate usage of the applications should occur from well-defined IP addresses. Additionally, look for focused interest in key personnel mailboxes across multiple days.

When accessing M365 and other internet-facing services the actor has used multiple commercial VPN and proxy providers. Mandiant has found evidence of the threat actor using PIA, NordVPN, Surfshark, VPN Unlimited, and PrivadoVPN, although there is no reason for these to be the only solutions used. There is also evidence to support that this actor has access to a purpose-built obfuscation network built from compromised small office/home office routers. Mandiant has no knowledge of how these routers are being compromised. The exit nodes for commercial VPNs and obfuscation networks change rapidly and sharing atomic indicators for hunting purposes is unlikely to yield results. Instead, identify the key individuals in the organization, with respect to the organization vertical and likely goals of the threat actor. Fetch mailitemsaccessed logs for those mailboxes for the last year or as long as retention allows. Analyze the SessionID values of the log events and look for IDs that span multiple IP addresses where the IP addresses are not in the user’s typical geographic location.

Cloning of Sensitive Virtual Machines

On VMware vCenter servers, VPXD logs contain valuable information for VM management related tasks such as clone events, powering on and off a VM, and creating snapshots. The threat actor often used the VSPHERE.LOCAL\Administrator account when cloning VMs and targeted VMs that would contain credentials such as password vaults and domain controllers. The threat actor would delete the cloned VM shortly after cloning, and primarily operated between the hours of 01:00 and 10:00 UTC. Investigators should search vCenter VPXD logs for activity that matches the aforementioned criteria and confirm if the cloning activity was intended or not.

Creation of Local vCenter and ESXi Accounts

Mandiant identified evidence the threat actor created a new local account to install BRICKSTORM and then removed the account after they were done. The following logs show the threat actor using the local Administrator account to create a new local account and add it to the BashShellAdministrators group. The threat actor established an SSH connection from a compromised appliance to vCenter using the newly created account and installed the BRICKSTORM backdoor on vCenter. Shortly after, the threat actor deleted the account. Investigators should review audit logs in /var/log/audit/sso-events/audit_events.log for the creation and deletion of local accounts and validate their purpose. In one instance, the threat actor named the account with a similar naming convention as a local service account used for backups on vCenter.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Claude Cowork Triggers Tech Stock Selloff as AI Threatens SaaS Business Models

February 23, 2026

Tech Topics For Task 2 Success

February 22, 2026

These defense tech topics are trending • Table.Briefings

February 20, 2026

Essex Tech a topic of conversation in Lynnfield

February 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Japan beat Australia to lift Women’s Asian Cup title | Football News

March 21, 2026

U.K. says Iran unsuccessfully targeted Diego Garcia base

March 21, 2026

Police groups call on Travis County DA Jose Garza to resign over misconduct

March 21, 2026

Trump hints at ‘winding down’ Iran war as US deploys more troops to region | US-Israel war on Iran News

March 21, 2026
News
  • Breaking News (6,591)
  • Business (349)
  • Career (5,247)
  • Climate (233)
  • Culture (5,164)
  • Education (5,512)
  • Finance (250)
  • Health (928)
  • Lifestyle (4,906)
  • Science (5,181)
  • Sports (378)
  • Tech (196)
  • Uncategorized (1)

Subscribe to Updates

Get the latest news from onlyfacts24.

Follow Us
  • Facebook
  • Instagram
  • TikTok

Subscribe to Updates

Get the latest news from ONlyfacts24.

News
  • Breaking News (6,591)
  • Business (349)
  • Career (5,247)
  • Climate (233)
  • Culture (5,164)
  • Education (5,512)
  • Finance (250)
  • Health (928)
  • Lifestyle (4,906)
  • Science (5,181)
  • Sports (378)
  • Tech (196)
  • Uncategorized (1)
Facebook Instagram TikTok
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy
  • Terms and services
© 2026 Designed by onlyfacts24

Type above and press Enter to search. Press Esc to cancel.