
BRICKSTORM
Go-based backdoor deployed by UNC5221 on VMware vCenter/ESXi; 393-day median dwell time, C2 via Cloudflare Workers.
Last refreshed: 17 April 2026 · Appears in 1 active topic
Why does BRICKSTORM operate undetected for more than a year inside enterprise networks?
Timeline for BRICKSTORM
BRICKSTORM dwell hits 393 days, Mandiant
Cybersecurity: Threats and DefencesMentioned in: Google closes $32bn Wiz deal; 38 M&A
Cybersecurity: Threats and Defences- What is BRICKSTORM and how does it work?
- BRICKSTORM is a Go-based backdoor deployed by China-linked UNC5221 on VMware vCenter and ESXi infrastructure. It uses Cloudflare Workers and Heroku for command-and-control, captures credentials via a companion filter called BRICKSTEAL, and clones domain controllers offline for credential theft.Source: Mandiant M-Trends 2026
- How long does BRICKSTORM stay hidden in a network?
- Mandiant's M-Trends 2026 report found the average BRICKSTORM dwell time is 393 days, meaning typical organisations do not detect the backdoor for over a year after initial compromise.Source: Mandiant M-Trends 2026
- How do I detect BRICKSTORM on VMware vCenter?
- Mandiant recommends enabling and retaining vCenter HTTP audit logs, reviewing Microsoft Entra Enterprise App permission scopes for unexpected mail-read grants, and monitoring for anomalous outbound HTTPS to Cloudflare Workers or Heroku endpoints from hypervisor infrastructure.Source: Mandiant M-Trends 2026
Background
BRICKSTORM is a Go-based backdoor developed and deployed by the China-nexus actor UNC5221 against VMware vCenter and ESXi hypervisors, and Linux and BSD appliances. Mandiant's M-Trends 2026 report disclosed that across observed intrusions the median dwell time is 393 days, with targets concentrated in US and UK legal services, Business Process Outsourcers (BPOs), SaaS providers and technology companies.
BRICKSTORM communicates exclusively through legitimate Cloud platforms, Cloudflare Workers and Heroku, so network-level monitoring sees normal Cloud-provider traffic rather than attacker infrastructure. A companion component called BRICKSTEAL acts as a servlet filter to intercept HTTP Basic Authentication on VMware vCenter, capturing credentials without any endpoint agent needing to be present. Domain-controller virtual machines are cloned for offline credential extraction, giving UNC5221 persistent access to the identity plane without generating authentication-log anomalies. Access to Microsoft Entra Identity Enterprise App scopes (`mail.read`, `full_access_as_app`) provides mail access without requiring any endpoint malware on staff devices.
The 393-day median dwell makes BRICKSTORM effectively invisible within typical SOC operational cycles, which are designed around malware-signature and endpoint-telemetry detection. Forensic discovery usually occurs during unrelated Incident Response or external threat intelligence leads rather than proactive detection. The campaign's primary value appears to be sustained intelligence collection from legal and professional services firms with privileged access to client M&A, IP and regulatory communications.