CISA disclosed alongside the FIRESTARTER advisory that an unnamed US federal agency was confirmed still hosting the implant in March, six months after the September patch cycle that should have closed the file 1. The agency had applied those patches on schedule and the implant rode through. CISA has not released the agency's identity.
The operational read of the implant's design explains the dwell. UAT-4356's FIRESTARTER writes itself back to disk before clean shutdowns, so a routine patch reboot reinstates the backdoor rather than removing it. There is no continuous outbound beacon to flag in network telemetry; activation runs through magic-packet primitives that look like ordinary WebVPN traffic until the secret prefix arrives. NCSC and CISA are, in effect, telling operators that the September patch cycle is not a closure event but a starting line for memory analysis and device-side anomaly detection.
BRICKSTORM sets the precedent that frames this dwell. Mandiant disclosed BRICKSTORM at much longer residency than the FIRESTARTER federal case, which signals that nation-state actors are confident they will be undetected long enough to amortise the implant cost across multiple operational objectives. The implication for any CISO with Cisco ASA or FTD at the edge is a procurement audit on attestation and immutable-boot product categories, plus a board-level conversation about disclosure exposure when 'patched' and 'clean' have decoupled.
