Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Researchers Uncover Prolonged Brickstorm Cyberespionage in U.S. Networks
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Technology

Researchers Uncover Prolonged Brickstorm Cyberespionage in U.S. Networks

Highlights

  • Researchers identify prolonged Brickstorm cyberattacks targeting U.S. tech and legal firms.

  • Detection reveals stealthy methods and unusually long periods inside victim networks.

  • Companies are urged to deploy new tools and enhance internal cyber defenses.

Samantha Reed
Last updated: 24 September, 2025 - 5:19 pm 5:19 pm
Samantha Reed 6 hours ago
Share
SHARE

Longstanding and highly elusive cyber intrusions have come to light as U.S. organizations grapple with the aftermath of a sophisticated espionage campaign, with some breaches evading detection for over a year. Recent research by Mandiant and the Google Threat Intelligence Group (GTIG) has revealed a persistent threat labeled “Brickstorm,” a toolset employed by suspected Chinese hackers aiming to gain access to sensitive intellectual property, confidential trade data, and national security intelligence. While the campaign has just gained public attention, many organizations remain unaware that their systems may still harbor traces of this advanced activity.

Contents
How Did Brickstorm Evade Detection for So Long?What Is the Scope of the Affected Organizations?What Tools Are Available for Detection and Response?

Earlier discussions around Chinese-linked cyber threat groups have focused on operations with shorter dwell times and more overt tactics, such as those exploiting well-known vulnerabilities or targeting prominent governmental bodies. The newly uncovered Brickstorm campaign distinguishes itself by its lengthy lateral infiltration, stealthy tactics, and strong focus on technology and legal service providers — often using these as gateways to compromise wider customer bases. Past reports gave limited insight into the attackers’ operational discipline and cleanup strategies, which are now identified as key hurdles for detection and attribution in this threat scenario.

How Did Brickstorm Evade Detection for So Long?

According to Mandiant and GTIG researchers, Brickstorm’s ability to remain undetected stems from its use of zero-day vulnerabilities and targets that lack strong endpoint detection, such as VMware vCenter and ESXi environments. The campaign reportedly shows a striking average dwell time of about 400 days. Targets primarily include legal and security-focused tech firms, but compromised organizations sometimes act as springboards for infiltration of their own customers’ systems. Investigators stress the challenge of tracing the malware, as indicators such as IP addresses and file signatures frequently differ across incidents.

What Is the Scope of the Affected Organizations?

While researchers stopped short of confirming which specific entities have been affected, they noted that many victim organizations — potentially numbering in the dozens or more — have not yet discovered intrusions on their networks. The hackers’ focus on both direct and downstream access means sensitive data from a wide array of secondary victims could have been compromised. Security experts refrain from linking the group directly to Chinese government agencies but have pointed out similarities to groups UNC5221 and Silk Typhoon, both of which are believed to operate at the behest of Chinese interests.

What Tools Are Available for Detection and Response?

In response to the campaign, Google and Mandiant have released a scanner script designed to help organizations detect possible Brickstorm infections on Unix-based systems. This detection tool works independently of traditional malware identification software and has been shared publicly. Acknowledging the urgency, Charles Carmakal, Chief Technology Officer at Mandiant Consulting, emphasized,

“We have no doubt that organizations will use our tools to hunt for this adversary, and they will find evidence of compromise in their environments.”

He also cautioned,

“The most important thing here is, if you find Brickstorm, you really need to do a very thorough enterprise investigation, because the adversary that’s dropping this is a very, very advanced adversary that is known for stealing intellectual property from organizations.”

Current findings underline the evolving sophistication of long-term cyber-espionage operations and the difficulties in tracing attackers who leverage both technical stealth and comprehensive cleanup methods. Organizations in the tech, legal, and security sectors are called upon to revisit their cyber defense practices, including proactive analysis for hidden threats and improved detection of subtle anomalies in systems lacking endpoint security. Notably, campaigns such as Brickstorm illustrate the growing threat posed by prolonged, silent breaches where intellectual property theft and espionage serve broader strategic goals. Proactive detection measures, along with industry cooperation and sharing of threat intelligence, are essential steps for organizations seeking to mitigate the risk of such sustained campaigns.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Institutions Shape Crypto Markets as Ethereum ETFs Draw Capital

Cohere Raises Valuation as Enterprise AI Demand Strengthens

Uber Expands Autonomous Cars to Drive Electric Vehicle Uptake

Tech Giants in UAE, India, and Africa Drive New Global Innovation Hubs

Developers Embrace AI Tools But Remain Wary of Their Reliability

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Analysts Predict Tesla Sales Surge in China for September
Next Article Tesla Outpaces Q3 Delivery Expectations With U.S. and China Demand Surge

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Guardian Agriculture Closes After Funding Shortfall Halts Drone Operations
Robotics
Tesla Sets Sights on Colombia with Job Openings
Electric Vehicle
Apple Prepares to Boost Garmin and Fitbit Compatibility on iPhones
Wearables
Intel Develops High-End Arc GPU with Nvidia Collaboration
Computing
Authorities Dismantle Scattered Spider’s Operations with Key Arrest
Cybersecurity
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?