Www.itsportsbetDocsCybersecurity
Related
Trellix Source Code Incident: Inside the Unauthorized Repository AccessNorth Korean Hackers Exploit AI-Generated npm Packages and Fake Companies in Latest Cyber Espionage CampaignA Step-by-Step Guide to Fortifying Your Enterprise Against AI-Powered Vulnerability Discovery8 Critical Insights into MuddyWater's Deceptive Microsoft Teams Ransomware CampaignA Deep Dive into the GitHub RCE Vulnerability: What It Is and How It WorkedHow to Respond to a Learning Platform Cyberattack: A Step-by-Step Guide for SchoolsCritical Vulnerability in Google Gemini CLI Could Allow Remote Code Execution (CVSS 10)Weekly Cyber Threat Digest: April 20, 2025

BRICKSTORM Malware Targets VMware vSphere – Urgent Hardening Required, Warn GTIG and Mandiant

Last updated: 2026-05-05 08:24:40 · Cybersecurity

Breaking: BRICKSTORM Campaign Exploits Virtualization Layer Weaknesses

A sophisticated malware campaign dubbed BRICKSTORM is actively targeting VMware vSphere environments, exploiting weak security configurations to gain persistent administrative control over virtualization layers, according to new research from Google Threat Intelligence Group (GTIG). The threat specifically targets vCenter Server Appliance (VCSA) and ESXi hypervisors, operating beneath guest operating systems where traditional endpoint detection and response (EDR) tools are ineffective.

BRICKSTORM Malware Targets VMware vSphere – Urgent Hardening Required, Warn GTIG and Mandiant
Source: www.mandiant.com

“These intrusions are not the result of a software vulnerability but rather the exploitation of weak security architecture, identity design, and a critical visibility gap in the virtualization control plane,” a GTIG researcher stated. The attack chain establishes long-term persistence by infiltrating the vSphere ecosystem, effectively rendering organizational tiering models obsolete.

Background: The Virtualization Layer Blind Spot

Virtualized environments, particularly VMware vSphere, have become prime targets for advanced persistent threats. The VCSA acts as the central administrative hub, often hosting tier‑0 workloads such as domain controllers and privileged access management solutions. Any compromise of the VCSA grants an attacker administrative control over all managed ESXi hosts and virtual machines.

Because standard security protections like EDR agents do not operate at the Photon Linux layer of the VCSA, attackers can operate unnoticed. “By persisting at the virtualization layer, threat actors bypass guest‑OS security controls entirely,” explained a Mandiant incident response expert. “This creates a blind spot that traditional security teams often overlook.”

What This Means: A Paradigm Shift for Infrastructure Defense

The BRICKSTORM campaign underscores the urgent need to treat virtualization infrastructure as a tier‑0 asset requiring dedicated hardening. Organizations must move beyond out‑of‑the‑box defaults and implement custom security configurations at both the vSphere and underlying Photon Linux layers.

BRICKSTORM Malware Targets VMware vSphere – Urgent Hardening Required, Warn GTIG and Mandiant
Source: www.mandiant.com

Mandiant has released a vCenter Hardening Script designed to automate security configurations directly on the Photon OS, closing the visibility gap. “This script enforces the essential hardening strategies and mitigating controls necessary to detect and block threats like BRICKSTORM,” a Mandiant representative noted. The script transforms the virtualization layer into a monitored, hardened environment.

Key Recommendations for Defenders

  • Immediately apply the Mandiant vCenter Hardening Script to enforce baseline security on all VCSA instances.
  • Implement host‑based configuration enforcement for ESXi hypervisors to prevent unauthorized changes.
  • Increase monitoring of the vSphere control plane using log aggregation and behavior analytics tailored for the virtualization layer.
  • Review identity and access management within vSphere to eliminate over‑privileged accounts and weak authentication.

Given the sophistication of BRICKSTORM, defenders are urged to prioritize these measures as a critical part of their security strategy. The threat is active, and the window to harden environments is narrowing.

For more details on the technical attack chain, refer to the original GTIG report. The Mandiant hardening script and additional guidance are available through official channels.