Close Menu
  • Breaking News
  • Business
  • Career
  • Sports
  • Climate
  • Science
    • Tech
  • Culture
  • Health
  • Lifestyle
  • Facebook
  • Instagram
  • TikTok
Categories
  • Breaking News (6,198)
  • Business (345)
  • Career (5,152)
  • Climate (232)
  • Culture (5,087)
  • Education (5,412)
  • Finance (242)
  • Health (925)
  • Lifestyle (4,844)
  • Science (5,090)
  • Sports (366)
  • Tech (191)
  • Uncategorized (1)
Hand Picked

UBS Q4 earnings

February 4, 2026

Space tourism raises ‘urgent’ fertility questions, Nasa says

February 4, 2026

Career Day at Florence County High School | News, Sports, Jobs

February 4, 2026

Netflix’s antitrust hearing morphed into a culture-war fight over ‘wokeness’

February 4, 2026
Facebook X (Twitter) Instagram
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy
  • Terms and services
Facebook X (Twitter) Instagram
onlyfacts24
  • Breaking News

    UBS Q4 earnings

    February 4, 2026

    Judge restricts use of tear gas on protesters at Portland ICE facility

    February 4, 2026

    LIVE: Israeli attacks kill 10 Palestinians; restrictions at Rafah crossing | Gaza News

    February 4, 2026

    Asian software stocks plunge after U.S. peers decline on fears over AI-led disruption

    February 4, 2026

    Lawmakers demand answers from FFA over Chinese Communist Party ties

    February 4, 2026
  • Business

    ‘A very relevant topic for our businesses’: Weyburn Chamber’s Lunch & Learn – DiscoverWeyburn.com

    February 3, 2026

    Silver Prices Soar to 1979 Levels | Business Insider posted on the topic

    February 3, 2026

    Business Reporting Beyond the Bottom Line – National Press Foundation

    February 1, 2026

    What Is a Digital Twin?

    February 1, 2026

    Building Swindon’s Future will be topic of discussion at Business West event

    January 27, 2026
  • Career

    Career Day at Florence County High School | News, Sports, Jobs

    February 4, 2026

    He had a successful career in America. Now 80, he’s ‘living out of a suitcase’ in Italy | Lifestyle

    February 4, 2026

    Career Success Platform helps students build workforce skills

    February 4, 2026

    zSpace Career Explorer™ Powered by Career Coach AI™ Receives Tech & Learning’s Best of 2025 Award of Excellence

    February 4, 2026

    zSpace Career Explorer wins Tech & Learning 2025 award

    February 3, 2026
  • Sports

    Madison Square Garden | concerts, sports, entertainment

    January 21, 2026

    New Bay City schools superintendent Grant Hegenauer tackles sports-topic Q&A

    January 21, 2026

    Catch rule could become a hot topic in 2026 offseason

    January 20, 2026

    Protests, State House activity, high school sports topic of central Maine week in photos

    January 16, 2026

    Figure skating | Olympics, Jumps, Moves, History, & Competitions

    January 16, 2026
  • Climate

    Youth and the Environment – Geneva Environment Network

    January 30, 2026

    PA Environment & Energy Articles & NewsClips By Topic

    January 26, 2026

    PA Environment Digest BlogStories You May Have Missed Last Week: PA Environment & Energy Articles & NewsClips By TopicPA Environment Digest Puts Links To The Best Environment & Energy Articles and NewsClips From Last Week Here By Topic–..1 day ago

    January 18, 2026

    The Providence JournalWill the environment be a big topic during the legislative session? What to expectEnvironmental advocates are grappling with how to meet the state's coming climate goals..1 day ago

    January 13, 2026

    New Updates To California’s Climate Disclosure Laws – Climate Change

    January 6, 2026
  • Science
    1. Tech
    2. View All

    Home Office admits facial recognition tech issue with black and Asian subjects | Facial recognition

    January 26, 2026

    EU researchers are increasingly publishing on tech topics with China • Table.Briefings

    January 9, 2026

    CES 2026 trends to watch: 5 biggest topics we’re expecting at the world’s biggest tech show

    January 1, 2026

    turbulent year for end-device and downstream applications

    January 1, 2026

    Space tourism raises ‘urgent’ fertility questions, Nasa says

    February 4, 2026

    NASA had 3 years to fix fuel leaks on its Artemis moon rocket. Why are they still happening?

    February 4, 2026

    Deflated: Israeli scientists find Jupiter, though huge, is smaller than previously thought

    February 4, 2026

    From Jupiter to Mercury: the brightest planets of February 2026

    February 4, 2026
  • Culture

    Netflix’s antitrust hearing morphed into a culture-war fight over ‘wokeness’

    February 4, 2026

    ‘New York is constantly being renewed’: how Muslim creatives are changing the city’s cultural landscape | New York

    February 4, 2026

    Netflix’s co-CEO went to an antitrust hearing and a culture war broke out

    February 4, 2026

    Rowing News | Vanderbilt Rowing’s Culture of Respect

    February 4, 2026

    Slate’s daily game of questions about culture.

    February 3, 2026
  • Health

    Rural Health Transformation Program Topic of Monthly Hospital Board Meeting

    February 3, 2026

    Medical evacuations out of U.S. Central and U.S. Africa Commands among the active and reserve components of the U.S. Armed Forces, 2024

    January 30, 2026

    Heart Health the Topic at Free OZH Dinner in February

    January 30, 2026

    Rural mental health topic of Wellness Wednesday | News, Sports, Jobs

    January 30, 2026

    Absolute and relative morbidity burdens attributable to various illnesses and injuries among non-service member beneficiaries of the Military Health System, 2024

    January 29, 2026
  • Lifestyle
Contact
onlyfacts24
Home»Tech»Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
Tech

Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors

November 14, 2025No Comments
Facebook Twitter Pinterest LinkedIn Tumblr Email
03 ThreatIntelligenceWebsiteBannerIdeas BA.max 2600x2600.png
Share
Facebook Twitter LinkedIn Pinterest Email

File and Backup Scan for BRICKSTORM

YARA rules have proven to be the most effective method for detecting BRICKSTORM binaries on appliances. We are sharing relevant YARA rules in the appendix section of this post. Yara can be difficult to run at scale, but some backup solutions provide the ability to run YARA across the backup data store. Mandiant is aware of multiple customers who have identified BRICKSTORM through this method. 

To aid organizations in hunting for BRICKSTORM activity in their environments, Mandiant released a scanner script, which can run on appliances and other Linux or BSD-based systems. 

Internet Traffic from Edge Devices and Appliances

Use the inventory of appliance management IP addresses to hunt for evidence of malware beaconing in network logs. In general, appliances should not communicate with the public Internet from management IP addresses except to download updates and send crash analytics to the manufacturer. 

Established outbound traffic to domains or IP addresses not controlled by the appliance manufacturer should be regarded as very suspicious and warranting forensic review of the appliance. BRICKSTORM can use DNS over HTTP (DoH), which should be similarly rare when sourced from appliance management IP addresses.

Access to Windows Systems from Appliances

The threat actor primarily accessed Windows machines (both desktops and servers) using type 3 (network) logins, although in some cases the actor also established RDP sessions. Appliances should rarely log in to Windows desktops or servers and any connections should be treated as suspicious. Some examples of false positives could include VPN appliances using a known service account to connect to a domain controller in order to perform LDAP lookups and authenticated vulnerability scanners using a well-known service account. 

In addition to EDR telemetry, Terminal Services logs and Security event logs, defenders should obtain and parse the Windows User Access Log (UAL). The UAL is stored on Windows Servers inside the directory Windows\System32\LogFiles\Sum and can be parsed using open-source tools such as SumECmd. This log source records attempted authenticated connections to Windows systems and often retains artifacts going back much longer than typical Windows event logs. Note that this log source includes successful and unsuccessful logins, but is still useful to identify suspicious activity sourced from appliances.

Access to Credentials and Secrets

Use the forensic capabilities of EDR tools to acquire Windows Shellbags artifacts from Windows workstations and servers. Shellbags records folder paths that are browsed by a user with the Windows Explorer application. Use an open-source parser to extract the relevant data and look for patterns of activity that are suspicious:

  • Access to folder paths where the initiating user is a service account, especially service accounts that are unfamiliar or rarely used

  • File browsing activity sourced from servers that include a Windows Universal Naming Convention (UNC) path that points to a workstation (e.g., \\bobwin7.corp.local\browsing\path)

  • File browsing activity to folder paths that contain credential data, such as:

    • Browser profile paths (e.g., %appdata%\Mozilla\Firefox\Profiles)

    • Appdata locations used to store session tokens (e.g., Users\\.azure\)

    • Windows credential vault (%appdatalocal%\Microsoft\Credentials)

    • Data Protection API (DPAPI) keys (%appdata%\Microsoft\Protect\\)

Access to M365 Mailboxes using Enterprise Application

Mandiant has observed this actor use common techniques to conduct bulk email access and exfiltration from Microsoft 365 Exchange Online. Organizations should follow our guidance outlined in our APT29 whitepaper to hunt for these techniques. Although the white paper specifically references APT29, these techniques have become widely used by many groups. In multiple investigations the threat actor used a Microsoft Entra ID Enterprise Application with mail.read or full_access_as_app scopes to access mailboxes of key individuals in the victim organization.

To hunt for this activity, we recommend a phased approach:

  1. Enumerate the Enterprise Applications and Application Registrations with graph permissions that can read all mail.

  2. For each application, validate that there is at least one secret or certificate configured for it. Record the Application (client) ID

  3. Conduct a free text search against the Unified Audit Log or the OfficeActivity table in Sentinel for the client IDs from step 2. This will return the mailitemsaccessed events that recorded the application accessing mail.

  4. For each application analyze the source IP addresses and user-agent strings for discrepancies. Legitimate usage of the applications should occur from well-defined IP addresses. Additionally, look for focused interest in key personnel mailboxes across multiple days.

When accessing M365 and other internet-facing services the actor has used multiple commercial VPN and proxy providers. Mandiant has found evidence of the threat actor using PIA, NordVPN, Surfshark, VPN Unlimited, and PrivadoVPN, although there is no reason for these to be the only solutions used. There is also evidence to support that this actor has access to a purpose-built obfuscation network built from compromised small office/home office routers. Mandiant has no knowledge of how these routers are being compromised. The exit nodes for commercial VPNs and obfuscation networks change rapidly and sharing atomic indicators for hunting purposes is unlikely to yield results. Instead, identify the key individuals in the organization, with respect to the organization vertical and likely goals of the threat actor. Fetch mailitemsaccessed logs for those mailboxes for the last year or as long as retention allows. Analyze the SessionID values of the log events and look for IDs that span multiple IP addresses where the IP addresses are not in the user’s typical geographic location.

Cloning of Sensitive Virtual Machines

On VMware vCenter servers, VPXD logs contain valuable information for VM management related tasks such as clone events, powering on and off a VM, and creating snapshots. The threat actor often used the VSPHERE.LOCAL\Administrator account when cloning VMs and targeted VMs that would contain credentials such as password vaults and domain controllers. The threat actor would delete the cloned VM shortly after cloning, and primarily operated between the hours of 01:00 and 10:00 UTC. Investigators should search vCenter VPXD logs for activity that matches the aforementioned criteria and confirm if the cloning activity was intended or not.

Creation of Local vCenter and ESXi Accounts

Mandiant identified evidence the threat actor created a new local account to install BRICKSTORM and then removed the account after they were done. The following logs show the threat actor using the local Administrator account to create a new local account and add it to the BashShellAdministrators group. The threat actor established an SSH connection from a compromised appliance to vCenter using the newly created account and installed the BRICKSTORM backdoor on vCenter. Shortly after, the threat actor deleted the account. Investigators should review audit logs in /var/log/audit/sso-events/audit_events.log for the creation and deletion of local accounts and validate their purpose. In one instance, the threat actor named the account with a similar naming convention as a local service account used for backups on vCenter.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Home Office admits facial recognition tech issue with black and Asian subjects | Facial recognition

January 26, 2026

EU researchers are increasingly publishing on tech topics with China • Table.Briefings

January 9, 2026

CES 2026 trends to watch: 5 biggest topics we’re expecting at the world’s biggest tech show

January 1, 2026

turbulent year for end-device and downstream applications

January 1, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

UBS Q4 earnings

February 4, 2026

Space tourism raises ‘urgent’ fertility questions, Nasa says

February 4, 2026

Career Day at Florence County High School | News, Sports, Jobs

February 4, 2026

Netflix’s antitrust hearing morphed into a culture-war fight over ‘wokeness’

February 4, 2026
News
  • Breaking News (6,198)
  • Business (345)
  • Career (5,152)
  • Climate (232)
  • Culture (5,087)
  • Education (5,412)
  • Finance (242)
  • Health (925)
  • Lifestyle (4,844)
  • Science (5,090)
  • Sports (366)
  • Tech (191)
  • Uncategorized (1)

Subscribe to Updates

Get the latest news from onlyfacts24.

Follow Us
  • Facebook
  • Instagram
  • TikTok

Subscribe to Updates

Get the latest news from ONlyfacts24.

News
  • Breaking News (6,198)
  • Business (345)
  • Career (5,152)
  • Climate (232)
  • Culture (5,087)
  • Education (5,412)
  • Finance (242)
  • Health (925)
  • Lifestyle (4,844)
  • Science (5,090)
  • Sports (366)
  • Tech (191)
  • Uncategorized (1)
Facebook Instagram TikTok
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy
  • Terms and services
© 2026 Designed by onlyfacts24

Type above and press Enter to search. Press Esc to cancel.