China-Backed Hackers Target European Firms with New BRICKSTORM Malware

Article Highlights
Off On

Recent revelations have unveiled a covert cyber espionage operation targeting European businesses with a sophisticated tool called BRICKSTORM. China-backed hackers have advanced their tactics by modifying this previously Linux-specific malware to now breach Windows-based systems. On April 15, NVISO, a European cybersecurity company, released an in-depth report, shedding light on the activities and implications of these new developments. The report detailed two new Windows BRICKSTORM samples uncovered, indicating an ongoing espionage campaign against important European industries since the previous year. Written in Go, these new samples allow for intricate file management and network tunneling, equipping attackers with the ability to move laterally within targeted systems and evade detection.

Analysis of BRICKSTORM’s Capabilities

Unlike its Linux counterpart, the Windows version of BRICKSTORM samples lacks direct command execution. Yet, it achieves similar outcomes by utilizing network tunneling and legitimate credentials to exploit protocols such as Remote Desktop Protocol (RDP) and Server Message Block (SMB). This calculated strategy employs DNS over HTTPS (DoH) to communicate with command-and-control (C2) servers, thereby bypassing traditional security methods like DNS monitoring and geo-blocking. Attackers also implement persistence techniques, such as scheduled tasks, to maintain access to compromised systems while remaining unnoticed.

A key component of these attacks involves using serverless providers like Cloudflare and Heroku for C2 operations. Exploiting these distributed providers’ IP addresses helps attackers mask their activities, complicating detection efforts by defense mechanisms. Despite seeming basic, BRICKSTORM’s success hinges on precise execution and adaptability, showcasing the expertise of state-sponsored cyber operatives. NVISO’s analysis underscores the urgent need for sectors vulnerable to these threats to bolster their cybersecurity measures and rigorously monitor for irregular activities.

Ultimately, the transition of BRICKSTORM from Linux to Windows platforms highlights the relentless evolution of cyber threats led by nation-state actors. The malware’s persistent effectiveness underscores the necessity for industries to stay alert and proactive. Enhancing defense mechanisms and maintaining vigilant surveillance for unusual activities are essential steps to defend against these advanced cyber threats.

Explore more

Can DITO Shake Up Philippines’ Telecom Market with 5G Expansion?

In the rapidly evolving telecommunications industry of the Philippines, DITO Telecommunity has embarked on a noteworthy mission to disrupt the longstanding duopoly held by Globe Telecom and PLDT. Through strategic deployment and expansion of its fixed wireless broadband services, DITO is making waves with its innovative approach and aggressive growth targets. Central to this ambitious plan is the utilization of

UK’s 5G Coverage Below Expectations, Users Report Frustrations

The ambitious drive towards robust 5G connectivity in the UK has encountered some stumbling blocks, leading to a gap between expectations and reality in mobile network performance. Although the UK Government has set targets for widespread Gigabit-ready internet access by 2030, a new report reveals that user experiences are falling short of these objectives. Data shows that UK residents connect

What Is the Future of B2B Marketing in a Digital World?

As businesses step firmly into the digital era, B2B marketing faces a transformative shift reshaping its dynamics. Evolving digital landscapes compel marketers to adapt, as data reveals that 77% of B2B buyers engage in thorough research before initiating contact with vendors. This change emphasizes the critical importance of being present across multiple digital channels, providing actionable insights for harnessing technology’s

Why Do Google Ads Fail in B2B and How Can You Fix It?

In today’s competitive landscape, businesses are increasingly turning to digital advertising platforms like Google Ads to gain a foothold in the B2B market. However, the starkly different purchasing behavior of businesses compared to consumers presents unique challenges. B2B buying processes often involve longer sales cycles and multiple decision-makers, meaning traditional Google Ads strategies that work for B2C could fail here,

Qatar Embraces Open Banking to Propel Fintech Advances

In an era marked by rapid digital transformation, Qatar has emerged as a frontrunner in leveraging Open Banking to stimulate fintech innovation. As financial technology continues to evolve, Qatar’s strategic approach has positioned it as a burgeoning hub within the Middle East, fostering a dynamic ecosystem that integrates banks, fintech companies, and third-party providers through secure data-sharing protocols. This approach