Particle.news

Download on the App Store

Google and Mandiant Reveal ‘Brickstorm’ Espionage With Yearlong Dwell in U.S. Networks

Researchers released hunting tools to prompt searches that could surface widespread, previously unseen compromises.

Overview

  • GTIG and Mandiant report an average dwell time of roughly 393–400 days for Brickstorm intrusions before detection.
  • Primary targets included legal services, technology firms, SaaS providers and BPOs, with access leveraged to reach downstream customers.
  • Investigators cite likely exploitation of edge devices and consistent targeting of VMware vCenter/ESXi systems that lack EDR coverage.
  • Operators exfiltrated email via Microsoft Entra ID Enterprise Apps and used a SOCKS proxy to tunnel into internal systems, harvesting credentials with the Bricksteal servlet filter.
  • Attribution overlaps with suspected Chinese cluster UNC5221; governments were notified, and the new scanner and YARA rules can aid hunts but may miss some variants.