BrickStorm Strikes Back: New Windows Variants Threaten Security in 2024

BrickStorm backdoor versions are targeting Windows environments, warns Nviso. The Chinese APT UNC5221 exploited zero-day vulnerabilities in Ivanti Connect Secure VPN to hack MITRE. While lacking command execution, the Windows variants use network tunneling and stolen credentials for attacks. Industries must enhance security to counter these persistent adversaries.

Pro Dashboard

Hot Take:

BrickStorm is back, baby! The hackers have decided to ring in the New Year with a bang, taking a play straight out of the hacker’s guidebook by using their trusty backdoor technique to crash MITRE’s party. New year, new exploits, same old cyber chaos. Maybe it’s time to treat cyber threats like a gym membership – always active, always lurking, and somehow always one step ahead of you.

Key Points:

  • UNC5221, a Chinese APT, exploited zero-day vulnerabilities in Ivanti Connect Secure VPN to infiltrate MITRE.
  • BrickStorm backdoor now has Windows variants targeting European organizations.
  • The backdoor uses DNS over HTTPS to conceal command-and-control server communications.
  • Public cloud services are being exploited to hide the hackers’ infrastructure.
  • Nviso stresses the importance of upgrading security measures against such persistent threats.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?