China-Backed Hackers Target European Firms with New BRICKSTORM Malware

Article Highlights
Off On

Recent revelations have unveiled a covert cyber espionage operation targeting European businesses with a sophisticated tool called BRICKSTORM. China-backed hackers have advanced their tactics by modifying this previously Linux-specific malware to now breach Windows-based systems. On April 15, NVISO, a European cybersecurity company, released an in-depth report, shedding light on the activities and implications of these new developments. The report detailed two new Windows BRICKSTORM samples uncovered, indicating an ongoing espionage campaign against important European industries since the previous year. Written in Go, these new samples allow for intricate file management and network tunneling, equipping attackers with the ability to move laterally within targeted systems and evade detection.

Analysis of BRICKSTORM’s Capabilities

Unlike its Linux counterpart, the Windows version of BRICKSTORM samples lacks direct command execution. Yet, it achieves similar outcomes by utilizing network tunneling and legitimate credentials to exploit protocols such as Remote Desktop Protocol (RDP) and Server Message Block (SMB). This calculated strategy employs DNS over HTTPS (DoH) to communicate with command-and-control (C2) servers, thereby bypassing traditional security methods like DNS monitoring and geo-blocking. Attackers also implement persistence techniques, such as scheduled tasks, to maintain access to compromised systems while remaining unnoticed.

A key component of these attacks involves using serverless providers like Cloudflare and Heroku for C2 operations. Exploiting these distributed providers’ IP addresses helps attackers mask their activities, complicating detection efforts by defense mechanisms. Despite seeming basic, BRICKSTORM’s success hinges on precise execution and adaptability, showcasing the expertise of state-sponsored cyber operatives. NVISO’s analysis underscores the urgent need for sectors vulnerable to these threats to bolster their cybersecurity measures and rigorously monitor for irregular activities.

Ultimately, the transition of BRICKSTORM from Linux to Windows platforms highlights the relentless evolution of cyber threats led by nation-state actors. The malware’s persistent effectiveness underscores the necessity for industries to stay alert and proactive. Enhancing defense mechanisms and maintaining vigilant surveillance for unusual activities are essential steps to defend against these advanced cyber threats.

Explore more

The Future of Data Entry: Integrating AI, RPA, and Human Insight

Organizations failing to recognize the fundamental shift from clerical data entry to intelligent information synthesis risk a complete loss of operational competitiveness in a global market that no longer rewards manual speed. The landscape of data management is undergoing a profound transformation, moving away from the stagnant, labor-intensive practices of the past toward a dynamic, technology-driven ecosystem. Historically, data entry

Getsitecontrol Debuts Free Tools to Boost Email Performance

Digital marketers often face a frustrating paradox where the most visually stunning campaign assets are the very things that cause an email to vanish into a spam folder or fail to load on a mobile device. The introduction of Getsitecontrol’s new suite marks a significant pivot toward accessible, high-performance marketing utilities. By offering browser-based solutions for file optimization, the platform

How Can AI and ActiveCampaign Boost Marketing Conversions?

Navigating the complexities of a deregulated energy market often leaves consumers feeling overwhelmed by a constant barrage of jargon-heavy mailers and fluctuating utility rates that seem impossible to track. For businesses operating in this space, the challenge lies in delivering the right message at the exact moment a customer is ready to make a financial decision. Adam Cain, leading growth

How Is Sloppy Lemming Reshaping South Asian Cyber Espionage?

A single breach in a nuclear regulatory database can shift the balance of power across an entire subcontinent before a single soldier crosses a physical border. The digital landscape of South Asia has evolved into a high-stakes theater where state-aligned threat actors operate with increasing audacity and reach. Among these entities, the group identified as Sloppy Lemming has emerged as

Three Core Traits of Highly Effective Modern Leaders

Ling-yi Tsai, a seasoned expert in HR technology and organizational psychology, has spent decades helping global firms navigate the intersection of human behavior and digital transformation. With a deep focus on HR analytics and talent management, she specializes in translating complex psychological principles into actionable leadership strategies that drive measurable results. Her work emphasizes that the most successful organizations are