A sophisticated cyber espionage campaign leveraging the newly identified BRICKSTORM malware variants has targeted European strategic industries since at least 2022.
According to NVISO’s technical analysis, these backdoors previously confined to Linux vCenter servers now infect Windows environments, employing multi-tiered encryption, DNS-over-HTTPS (DoH) obfuscation, and cloud-based Command & Control (C2) infrastructure to evade detection.
The malware, linked to China-nexus actor UNC5221, aligns with the People’s Republic of China’s (PRC) strategic objectives to acquire intellectual property and technological secrets for economic advancement.
The Windows variants of BRICKSTORM, written in Go 1.13.5, lack direct command execution functionality but instead rely on network tunneling to abuse protocols like RDP and SMB using stolen credentials.
This shift avoids parent-child process monitoring, a common detection mechanism for interactive threats.
The malware’s file management system uses a JSON-based HTTP API to upload, download, and modify files, while its tunneling module supports TCP, UDP, and ICMP relaying for lateral movement.
A critical update in newer samples is the introduction of hardcoded IP addresses (via the IPAddrs
configuration parameter), allowing operation in DoH-restricted environments.
Older variants exclusively relied on DoH resolution via providers like Quad9 and Cloudflare, embedding DNS queries within HTTPS POST requests to bypass traditional monitoring.
BRICKSTORM employs a nested TLS framework to obscure communications:
AuthKey
.This architecture ensures that even if outer layers are inspected, the innermost TLS-encrypted traffic remains opaque.
Notably, BRICKSTORM’s operators intermittently exposed second-tier infrastructure during maintenance, revealing Vultr-hosted instances (e.g., 64.176.166.79
) behind the cloud frontends.
BRICKSTORM’s C2 infrastructure leverages dynamic DNS services like nip.io
and certificate transparency loopholes.
For example, the domain ms-azure.azdatastore.workers.dev
utilized Cloudflare’s wildcard certificates, while historical Heroku domains (ms-azure.herokuapp.com
) were registered as early as 2022.
The malware’s operators maintained persistent access by rotating IPs and updating TLS certificates, such as the 2024–2025 certificate used for nested TLS layers.
Organizations should monitor for the following artifacts associated with BRICKSTORM intrusions:
NVISO recommends layered defenses to counter BRICKSTORM’s evasion tactics:
CreatedUACExplorer.exe
or connections to the listed domains and IPs.The PRC’s enduring focus on economic espionage necessitates continuous monitoring of network appliances and serverless cloud traffic, which BRICKSTORM exploits for long-term intrusion.
Collaborative defenses and real-time intelligence sharing remain critical to mitigating such advanced threats.
Indicator Type | Value |
---|---|
Filename | CreatedUACExplorer.exe |
SHA256 Hash | b42159d68ba58d7857c091b5acc59e30e50a854b15f7ce04b61ff6c11cdf0156 |
Associated Domain | ms-azure.azdatastore.workers.dev |
Filename | CreateUACExplorer.exe |
SHA256 Hash | 42692bd13333623e9085d0c1326574a3391efcbf18158bb04972103c9ee4a3b8 |
Associated Domain | ms-azure.herokuapp.com |
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
DocuSign has emerged as a cornerstone for over 1.6 million customers worldwide, including 95% of…
In a landmark initiative, international cybersecurity agencies have released a comprehensive series of publications to…
A severe security flaw has been identified in the TI WooCommerce Wishlist plugin, a widely…
Microsoft Threat Intelligence Center (MSTIC) has issued a critical warning about a cluster of global…
A recent investigation by security analysts has uncovered a persistent phishing campaign targeting Italian and…
Threat actors have exploited a critical Remote Code Execution (RCE) vulnerability, identified as CVE-2025-32432, in…