US and Canadian cybersecurity agencies have confirmed that a sophisticated malware campaign, known as "Brickstorm," has been targeting government entities and tech companies in an effort to gain unauthorized access to sensitive data.
The attackers, linked to the Chinese government, allegedly infiltrated at least one government entity by exploiting vulnerabilities in the VMware vSphere cloud computing platform. They used a backdoor to establish long-term access to the victim's internal network, allowing them to steal credentials, manipulate files, and create "rogue" virtual machines. This effectively gave the attackers control over the affected system without being detected.
The cyber attack could have begun as early as April 2024 and lasted until at least September this year. The attackers reportedly used eight different samples of Brickstorm malware, although it's unclear how many organizations were targeted or compromised in total.
In response to the alleged hack, Broadcom, the owner of VMware vSphere, has informed its customers that they should download up-to-date security patches whenever possible. Additionally, Google's Threat Intelligence Group has urged organizations to reevaluate their threat models and conduct "hunt exercises" against specified threat actors.
The attack highlights the ongoing threat posed by state-sponsored hackers and the importance of robust cybersecurity measures to protect sensitive data and prevent unauthorized access.
The attackers, linked to the Chinese government, allegedly infiltrated at least one government entity by exploiting vulnerabilities in the VMware vSphere cloud computing platform. They used a backdoor to establish long-term access to the victim's internal network, allowing them to steal credentials, manipulate files, and create "rogue" virtual machines. This effectively gave the attackers control over the affected system without being detected.
The cyber attack could have begun as early as April 2024 and lasted until at least September this year. The attackers reportedly used eight different samples of Brickstorm malware, although it's unclear how many organizations were targeted or compromised in total.
In response to the alleged hack, Broadcom, the owner of VMware vSphere, has informed its customers that they should download up-to-date security patches whenever possible. Additionally, Google's Threat Intelligence Group has urged organizations to reevaluate their threat models and conduct "hunt exercises" against specified threat actors.
The attack highlights the ongoing threat posed by state-sponsored hackers and the importance of robust cybersecurity measures to protect sensitive data and prevent unauthorized access.