Chinese Hackers Unleash Brickstorm: A Cyber Espionage Comedy of Errors
Chinese hackers have turned Brickstorm into the Swiss Army knife of malware, sneaking into U.S. tech and legal sectors. This Go-based backdoor waltzes past security like it’s on a stealth mission, siphoning data undetected for over a year. Clearly, Brickstorm isn’t just malware; it’s a master of disguise.

Hot Take:
Ah, the age-old tale of cat and mouse, but instead of cheese, the prize is your precious data. Chinese hackers are back with a vengeance, armed with Brickstorm – a malware so stealthy it should win a ninja award. While they pull off espionage like a high-tech Ocean’s Eleven, the rest of us are left to ponder why they didn’t just take up a safer hobby, like knitting. Remember folks, not all heroes wear capes, some wear dark hoodies and have questionable internet search histories.
Key Points:
– Brickstorm is a Go-based backdoor used by suspected Chinese hackers for long-term espionage.
– The malware has an average dwell time of 393 days, primarily targeting U.S. tech and legal sectors.
– Google Threat Intelligence Group (GTIG) identified the attacks as linked to the UNC5221 activity cluster.
– Brickstorm’s operations involve stealthy data exfiltration and privilege escalation techniques.
– Mandiant has provided a scanner script to aid in detecting the elusive Brickstorm malware.