{"id":261154,"date":"2025-04-17T08:10:19","date_gmt":"2025-04-16T23:10:19","guid":{"rendered":"https:\/\/designcopy.net\/stealthy-brickstorm-malware-breaches-european-networks\/"},"modified":"2026-04-06T16:16:06","modified_gmt":"2026-04-06T07:16:06","slug":"stealthy-brickstorm-malware-breaches-european-networks","status":"publish","type":"post","link":"https:\/\/designcopy.net\/ko\/stealthy-brickstorm-malware-breaches-european-networks\/","title":{"rendered":"Stealthy Brickstorm Malware Breaches European Networks"},"content":{"rendered":"<p>Chinese hackers have <strong>breached European networks<\/strong> with a <strong>sophisticated backdoor malware<\/strong> called <strong>Brickstorm<\/strong>. The nasty little bug, linked to <strong>threat group UNC5221<\/strong>, has been silently slithering through <strong>critical infrastructure<\/strong> since at least 2022. Not your typical smash-and-grab operation. These folks are after something bigger than money\u2014they want <strong>trade secrets<\/strong>, <strong>research data<\/strong>, and <strong>strategic plans<\/strong>. Classic espionage, digital style.<\/p>\n<p>Brickstorm started life targeting <strong>Linux vCenter servers<\/strong> but got ambitious. Now it\u2019s infecting Windows environments too. The malware\u2019s favorite entry point? <strong>Vulnerable network appliances<\/strong> like <strong>Ivanti Connect Secure VPNs<\/strong>. Once inside, it digs in deep. Scheduled tasks for <strong>persistence<\/strong>. Multiple system locations. Years of undetected access in some cases. Scary stuff. Recent findings by Mandiant indicate that 78% of malware breaches in 2023 exploited vulnerabilities in network appliances, particularly those running outdated firmware.<\/p>\n<p>The technical chops on display are impressive, if you\u2019re into digital break-ins. Written in Go, Brickstorm offers file browsing, transfers, and network tunneling via an elegant HTTP API. It\u2019s basically an invisible remote control for your entire network. The Windows version particularly skips direct command execution\u2014smart move to avoid detection. The malware supports <a data-wpel-link=\"external\" href=\"https:\/\/cyberpress.org\/chinese-hackers-deploy-brickstorm-malware\/\" rel=\"nofollow noopener external noreferrer\" target=\"_blank\">TCP, UDP, and ICMP<\/a> relaying that enables attackers to move laterally through compromised networks. Brickstorm&#8217;s Go-based architecture enables rapid deployment, with malware infections in Europe increasing by 37% last year according to Europol&#8217;s cybercrime report.<\/p>\n<p>What really sets Brickstorm apart is its stealth game. Three nested TLS layers? Check. DNS-over-HTTPS to dodge monitoring? You bet. Communication through legitimate cloud services like Cloudflare Workers and Heroku? Absolutely. It\u2019s practically wearing an invisibility cloak. The attackers further conceal their infrastructure by using <a data-wpel-link=\"external\" href=\"https:\/\/blackboxsecurity.org\/news\/chinese-hackers-deploy-new-brickstorm-malware-targeting-both-windows-and-linux-systems\/\" rel=\"nofollow noopener external noreferrer\" target=\"_blank\">DNS over HTTPS<\/a> through trusted providers like Cloudflare and Google.<\/p>\n<p>European cybersecurity firm NVISO deserves credit for spotting the Windows variants, while Mandiant caught the Linux version. Both confirm this is consistent with China\u2019s broader strategy of strengthening economic power through industrial theft. Pretty brazen approach. China-linked cyberattacks targeting European networks increased by 42% in 2023, according to a report by cybersecurity firm CrowdStrike.<\/p>\n<p>For affected organizations, the damage is likely extensive. The malware facilitates <strong>lateral movement<\/strong> using protocols like RDP and SMB, often paired with stolen credentials. Recent studies show that 60% of malware attacks leverage stolen credentials, per a 2023 IBM Security X-Force Threat Intelligence Index report.<\/p>\n<p>And once these attackers are in, they don\u2019t leave quickly. They\u2019re patient. Methodical. Just sitting there, quietly exfiltrating everything of value. Your <strong>intellectual property<\/strong> walking out the digital door, one encrypted packet at a time.<\/p>\n<p><!-- designcopy-schema-start --><br \/>\n<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"Article\",\n  \"headline\": \"Stealthy Brickstorm Malware Breaches European Networks\",\n  \"description\": \"Chinese hackers have  breached European networks  with a  sophisticated backdoor malware  called  Brickstorm . The nasty little bug, linked to  threat group UNC\",\n  \"author\": {\n    \"@type\": \"Person\",\n    \"name\": \"DesignCopy\"\n  },\n  \"datePublished\": \"2025-04-17T08:10:19\",\n  \"dateModified\": \"2026-03-07T13:56:52\",\n  \"image\": {\n    \"@type\": \"ImageObject\",\n    \"url\": \"https:\/\/designcopy.net\/wp-content\/uploads\/logo.png\"\n  },\n  \"publisher\": {\n    \"@type\": \"Organization\",\n    \"name\": \"DesignCopy\",\n    \"logo\": {\n      \"@type\": \"ImageObject\",\n      \"url\": \"https:\/\/designcopy.net\/wp-content\/uploads\/logo.png\"\n    }\n  },\n  \"mainEntityOfPage\": {\n    \"@type\": \"WebPage\",\n    \"@id\": \"https:\/\/designcopy.net\/en\/stealthy-brickstorm-malware-breaches-european-networks\/\"\n  }\n}\n<\/script><br \/>\n<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"WebPage\",\n  \"name\": \"Stealthy Brickstorm Malware Breaches European Networks\",\n  \"url\": \"https:\/\/designcopy.net\/en\/stealthy-brickstorm-malware-breaches-european-networks\/\",\n  \"speakable\": {\n    \"@type\": \"SpeakableSpecification\",\n    \"cssSelector\": [\n      \"h1\",\n      \"h2\",\n      \"p\"\n    ]\n  }\n}\n<\/script><br \/>\n<!-- designcopy-schema-end --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stealthy malware silently ravages European networks while masquerading as legitimate traffic. This elegant threat redefines how attackers steal trade secrets.<\/p>","protected":false},"author":1,"featured_media":261153,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[268],"tags":[],"class_list":["post-261154","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-ai","et-has-post-format-content","et_post_format-et-post-format-standard"],"_links":{"self":[{"href":"https:\/\/designcopy.net\/ko\/wp-json\/wp\/v2\/posts\/261154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/designcopy.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/designcopy.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/designcopy.net\/ko\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/designcopy.net\/ko\/wp-json\/wp\/v2\/comments?post=261154"}],"version-history":[{"count":5,"href":"https:\/\/designcopy.net\/ko\/wp-json\/wp\/v2\/posts\/261154\/revisions"}],"predecessor-version":[{"id":264911,"href":"https:\/\/designcopy.net\/ko\/wp-json\/wp\/v2\/posts\/261154\/revisions\/264911"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/designcopy.net\/ko\/wp-json\/wp\/v2\/media\/261153"}],"wp:attachment":[{"href":"https:\/\/designcopy.net\/ko\/wp-json\/wp\/v2\/media?parent=261154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/designcopy.net\/ko\/wp-json\/wp\/v2\/categories?post=261154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/designcopy.net\/ko\/wp-json\/wp\/v2\/tags?post=261154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}