top of page

PRC State Actors Deploy BRICKSTORM Backdoor Against VMware Virtualization Environments

December 10th, 2025

High

Our Cyber Threat Intelligence Unit is monitoring an active campaign attributed to People’s Republic of China (PRC) state-sponsored actors leveraging a custom Go-based backdoor known as BRICKSTORM. According to CISA, NSA, and the Canadian Cyber Centre, the malware is being deployed across government and information-technology service environments, with a focus on compromising VMware vCenter, ESXi, and Windows hosts. BRICKSTORM provides long-term persistence, credential theft, virtual machine manipulation, and covert command-and-control operations, allowing threat actors to operate deeply within targeted infrastructures without detection. The campaign indicates a strategic effort to exploit virtualization platforms that usually fall outside standard endpoint monitoring. 

Technical Details

  • Attack Type: Stealthy backdoor / remote access trojan (RAT) targeting virtualization management systems.

  • Severity: High.

  • Malware Characteristics: BRICKSTORM is engineered for durability, stealth, and operational flexibility:

    • Blends malicious traffic with legitimate HTTPS and WebSocket activity.

    • Uses DNS-over-HTTPS (DoH) to resolve command-and-control (C2) servers via Cloudflare, Google, Quad9, and NextDNS.

    • Supports SOCKS proxying, full file-system manipulation, and arbitrary command execution.

    • Implements smux/Yamux multiplexing to maintain multiple parallel, encrypted C2 channels.

    • Masquerades as VMware-like binaries (e.g., vmware-sphere, vnetd, vami) and can serve HTML, CSS, and JS files to blend with normal appliance behavior.

  • Persistence Mechanisms:

    • Modification of VMware initialization scripts (e.g., /etc/sysconfig/) to enforce startup execution.

    • Self-watching processes to automatically restart or reinstall components.

    • PATH hijacking and self-copying for execution precedence.

    • Alteration of appliance startup behavior and the creation of hidden or rogue VMs to maintain covert access.

  • Access & Privilege Escalation Activities:

    • Use of web shells to compromise DMZ web servers.

    • Lateral movement via RDP using valid service account credentials.

    • Collection of NTDS.dit from domain controllers.

    • Use of compromised MSP credentials to access VMware vCenter.

    • Cloning VM snapshots for credential harvesting.

    • Compromise of domain controllers and ADFS, including export of cryptographic keys (per CISA AR25-338A).

    • Manipulation of virtual machines, including deployment of rogue appliances and VM-level tampering.

  • Command & Control:

    • DoH lookups for C2 discovery.

    • Encrypted WebSocket-based C2 channels upgraded from HTTPS.

    • Authentication via hard-coded cryptographic keys.

    • Multiplexed communications over smux/Yamux for resilient, covert operations.

  • Post-Exploitation Capabilities:

    • Full shell access for arbitrary execution.

    • File upload, download, deletion, slicing, and checksum operations.

    • Data exfiltration over the primary C2 channel.

    • SOCKS-based lateral tunneling to pivot across internal networks.

Image by ThisisEngineering

Impact

  • Persistent Unauthorized Access: Long-term, covert access to key virtualization and identity systems.

  • Privilege Escalation & Credential Compromise: Ability to clone VM snapshots, harvest credentials, and escalate to domain controllers or identity services such as ADFS.

  • Operational & Confidentiality Risk: Exposure of sensitive VM snapshots, backups, and system configurations; ability to stage additional tooling or malware in virtualized environments.

  • Infrastructure Manipulation: Creation of hidden or rogue VMs, tampering with hypervisors, and unauthorized modification of critical virtualization components.

  • Lateral Movement: Compromise of vCenter/ESXi facilitates rapid, stealthy propagation across large segments of the network.

Detection Method

Organizations should conduct targeted hunts across virtualization hosts, management appliances, identity systems, and network telemetry. Key detection areas include:

  • VMware / Virtualization Monitoring:

    • Unexpected logins or administrative actions in vCenter/ESXi.

    • Unusual or unauthorized VM creation, cloning, or snapshots (especially hidden VMs).

    • Alteration of startup scripts, service binaries, or management service behavior.

  • Endpoint & Server Indicators:

    • Unknown or suspicious ELF/Go binaries on ESXi or vCenter appliances.

    • External-facing network connections from hosts that typically should not initiate outbound traffic.

  • Identity & Directory Services:

    • Evidence of ADFS tampering, cryptographic key export, or unauthorized domain controller access.

    • DC access originating from virtualization appliances.

  • Network & Telemetry:

    • Low-volume, persistent HTTPS/WebSocket traffic from vCenter/ESXi systems.

    • Tunneling patterns consistent with SOCKS proxying or lateral pivoting.

Indicators of Compromise

IOC Type 

Value 

Filename 

vmsrc 

SHA256 

aaf5569c8e349c15028bc3fac09eb982efb06eabac955b705a6d447263658e38 

Filename  

vnetd 

SHA256  

013211c56caaa697914b5b5871e4998d0298902e336e373ebb27b7db30917eaf 

Filename 

if-up 

SHA256  

57bd98dbb5a00e54f07ffacda1fea91451a0c0b532cd7d570e98ce2ff741c21d 

Filename 

viocli 

SHA256 

b3b6a992540da96375e4781afd3052118ad97cfe60ccf004d732f76678f6820a 

Filename  

vts 

SHA256 

22c15a32b69116a46eb5d0f2b228cc37cd1b5915a91ec8f38df79d3eed1da26b 

Filename  

vmckd 

SHA256  

f7cda90174b806a34381d5043e89b23ba826abcc89f7abd520060a64475ed506 

SHA256  

39b3d8a8aedffc1b40820f205f6a4dc041cd37262880e5030b008175c45b0c46 

SHA256  

73fe8b8fb4bd7776362fd356fdc189c93cf5d9f6724f6237d829024c10263fe5 

 

IOC Type 

Value 

Hash 

40db68331cb52dd3ffa0698144d1e6919779ff432e2e80c058e41f7b93cec042 

Hash 

88db1d63dbd18469136bf9980858eb5fc0d4e41902bf3e4a8e08d7b6896654ed 

Hash 

9a0e1b7a5f7793a8a5a62748b7aa4786d35fc38de607fb3bb8583ea2f7974806 

Hash 

40992f53effc60f5e7edea632c48736ded9a2ca59fb4924eb6af0a078b74d557 

Hash 

b1221000f43734436ec8022caaa34b133f4581ca3ae8eccd8d57ea62573f301d 

Hash 

aa688682d44f0c6b0ed7f30b981a609100107f2d414a3a6e5808671b112d1878 

Hash 

2388ed7aee0b6b392778e8f9e98871c06499f476c9e7eae6ca0916f827fe65df 

Hash 

90b760ed1d0dcb3ef0f2b6d6195c9d852bcb65eca293578982a8c4b64f51b035 

IP 

208.83.233[.]14 

IP 

149.28.120[.]31 

 

mix of red, purple, orange, blue bubble shape waves horizontal for cybersecurity and netwo

Recommendations

  • Patch & Harden: Immediately update and harden all vCenter and ESXi appliances; review for unauthorized services or modified system files.

  • Rotate Privileged Credentials: Reset vCenter SSO accounts, ESXi root credentials, SSH keys, API tokens, and MSP-linked accounts.

  • Audit Persistence: Inspect virtualization hosts for unexpected binaries, modified init scripts, or newly created system services.

  • Restrict Management Access: Limit access to management networks and enforce strict firewall rules; block unnecessary outbound internet routes.

  • Enable Comprehensive Logging: Forward all vCenter, ESXi, DNS-over-HTTPS, and WebSocket-related telemetry to a SIEM.

  • Implement Integrity Monitoring: Deploy file integrity and behavioral monitoring on hypervisors and virtualization appliances.

  • Perform Full Incident Response: If indicators appear, rebuild compromised appliances, validate identity infrastructure integrity, and review for rogue VMs or snapshot cloning.

Conclusion

BRICKSTORM is a high-severity, virtualization-focused backdoor providing PRC-linked actors with deep, persistent, and stealthy access to government and IT environments. Its combination of web-shell initial access, credential theft, VM snapshot cloning, identity compromise, and encrypted, multiplexed C2 channels makes detection difficult and extends dwell times. Given the sophistication of the malware and active campaign reporting from CISA and partners, we urge organizations to deploy the published IoCs immediately, harden virtualization management systems, and implement continuous monitoring across hypervisors, identity services, and management networks.

bottom of page