Skip to content
BRICKSTORM
TechnologyCN

BRICKSTORM

Go-based backdoor deployed by UNC5221 on VMware vCenter/ESXi; 393-day median dwell time, C2 via Cloudflare Workers.

Last refreshed: 17 April 2026 · Appears in 1 active topic

Key Question

Why does BRICKSTORM operate undetected for more than a year inside enterprise networks?

Timeline for BRICKSTORM

#117 Apr

BRICKSTORM dwell hits 393 days, Mandiant

Cybersecurity: Threats and Defences
#117 Apr

Mentioned in: Google closes $32bn Wiz deal; 38 M&A

Cybersecurity: Threats and Defences
View full timeline →
Common Questions
What is BRICKSTORM and how does it work?
BRICKSTORM is a Go-based backdoor deployed by China-linked UNC5221 on VMware vCenter and ESXi infrastructure. It uses Cloudflare Workers and Heroku for command-and-control, captures credentials via a companion filter called BRICKSTEAL, and clones domain controllers offline for credential theft.Source: Mandiant M-Trends 2026
How long does BRICKSTORM stay hidden in a network?
Mandiant's M-Trends 2026 report found the average BRICKSTORM dwell time is 393 days, meaning typical organisations do not detect the backdoor for over a year after initial compromise.Source: Mandiant M-Trends 2026
How do I detect BRICKSTORM on VMware vCenter?
Mandiant recommends enabling and retaining vCenter HTTP audit logs, reviewing Microsoft Entra Enterprise App permission scopes for unexpected mail-read grants, and monitoring for anomalous outbound HTTPS to Cloudflare Workers or Heroku endpoints from hypervisor infrastructure.Source: Mandiant M-Trends 2026

Background

BRICKSTORM is a Go-based backdoor developed and deployed by the China-nexus actor UNC5221 against VMware vCenter and ESXi hypervisors, and Linux and BSD appliances. Mandiant's M-Trends 2026 report disclosed that across observed intrusions the median dwell time is 393 days, with targets concentrated in US and UK legal services, Business Process Outsourcers (BPOs), SaaS providers and technology companies.

BRICKSTORM communicates exclusively through legitimate Cloud platforms, Cloudflare Workers and Heroku, so network-level monitoring sees normal Cloud-provider traffic rather than attacker infrastructure. A companion component called BRICKSTEAL acts as a servlet filter to intercept HTTP Basic Authentication on VMware vCenter, capturing credentials without any endpoint agent needing to be present. Domain-controller virtual machines are cloned for offline credential extraction, giving UNC5221 persistent access to the identity plane without generating authentication-log anomalies. Access to Microsoft Entra Identity Enterprise App scopes (`mail.read`, `full_access_as_app`) provides mail access without requiring any endpoint malware on staff devices.

The 393-day median dwell makes BRICKSTORM effectively invisible within typical SOC operational cycles, which are designed around malware-signature and endpoint-telemetry detection. Forensic discovery usually occurs during unrelated Incident Response or external threat intelligence leads rather than proactive detection. The campaign's primary value appears to be sustained intelligence collection from legal and professional services firms with privileged access to client M&A, IP and regulatory communications.