China-Linked Cyber Spies Exploit Ivanti Flaws: A 393-Day Backdoor Comedy of Errors
Chinese spies have made Ivanti gear their new best friend, exploiting zero-days and remaining undetected for ages. These cyber ninjas use BRICKSTORM backdoors, evading traditional endpoint detection and response tools. Google’s Mandiant team offers a free scanner to hunt this malware. It’s a cat-and-mouse game, but with fewer mice and more espionage.

Hot Take:
Well, it looks like we’ve got another episode of “China’s Got Talent” – cyber espionage edition! UNC5221 is performing a 393-day-long magic trick by turning Ivanti appliances into a 24/7 backdoor circus, all while making endpoint detection tools look like confused spectators. Grab your popcorn, folks, because this is one stealthy show you won’t want to miss!
Key Points:
- UNC5221, likely linked to Chinese spies, has infiltrated multiple enterprise networks using zero-days in Ivanti gear.
- The intruders have remained undetected for an average of 393 days thanks to their backdoor, BRICKSTORM.
- Mandiant has released a free scanner to help detect BRICKSTORM on *nix-based systems.
- UNC5221 targets VMware systems and installs custom malware to maintain persistence.
- Traditional indicators of compromise (IOCs) are largely ineffective against these intrusions.
Already a member? Log in here