BRICKSTORM Malware Evolves: Deploying Triple-Layer Encryption to Bypass Enterprise Security
Security researchers have identified a sophisticated escalation in cyber espionage operations utilizing the advanced BRICKSTORM malware. Since late 2022, this Chinese-affiliated threat actor, tracked as UNC5221, has systematically targeted European organizations in strategic industries. What began as attacks focused on vCenter Linux servers has now evolved into a comprehensive threat capable of infiltrating Windows enterprise networks with enhanced stealth capabilities.
According to analysis from NVISO, the Windows variant of BRICKSTORM represents a significant advancement in malware sophistication. Key technical characteristics include:
The Windows variant is developed using Go 1.13.5 and employs an unusual approach to command execution. Rather than directly executing commands, which would create detectable parent-child process relationships, BRICKSTORM implements:
The malware’s communication infrastructure demonstrates remarkable adaptability:
BRICKSTORM’s most notable technical achievement is its three-layer traffic obfuscation system with nested TLS connections:
This multi-layered approach ensures that even if external HTTPS traffic is intercepted, the primary control channel remains encrypted and undetectable through standard security monitoring.
Despite the sophistication, researchers have documented occasional infrastructure leaks during maintenance operations, revealing VPS addresses hosted on Vultr among other infrastructure elements.
Command and control servers utilize:
NVISO security experts recommend implementing multi-layered defensive measures:
The operational patterns exhibited by UNC5221 align with the People’s Republic of China’s industrial espionage initiatives aimed at acquiring technological secrets. As this threat evolves, heightened attention to server environments, cloud infrastructure, and DNS monitoring systems remains essential.
Industry collaboration, threat intelligence sharing, and continuous security monitoring represent the most effective countermeasures against this sophisticated threat actor.