Flash.itsportsbetDocsCybersecurity
Related
How to Prevent Insider Threats and Manage Media Disclosures: Lessons from the NSA's Snowden AffairFinancial Cyberthreats in 2025: Key Trends and What to Expect in 2026Iran-Linked Hacktivists Claim Devastating Wiper Attack on Medical Device Giant StrykerWeekly Cyber Threat Intelligence: Q&A on Recent Attacks, AI Threats, and PatchesFortify Your Organization: A Practical Guide to Defending Against AI-Powered Vulnerability DiscoveryM-Trends 2026: Key Findings and Frontline Insights from Global Cyber Incident ResponseMarch 2026 Patch Tuesday: Microsoft Fixes 77 Vulnerabilities, Highlights Include Privilege Escalation and AI-Discovered BugEU Commission Breach, Hasbro Attack, Drift Protocol $280M Heist: Critical Cyber Threats Emerge

BRICKSTORM Malware Exploits VMware vSphere Weaknesses: Urgent Hardening Needed

Last updated: 2026-05-06 12:11:29 · Cybersecurity

Breaking News: Virtualization Layer Under Siege

Threat actors are actively exploiting the VMware vSphere ecosystem using the BRICKSTORM malware, Google Threat Intelligence Group (GTIG) warns. The attacks target the vCenter Server Appliance (VCSA) and ESXi hypervisors, establishing persistence below the guest operating system where traditional security tools fail.

BRICKSTORM Malware Exploits VMware vSphere Weaknesses: Urgent Hardening Needed
Source: www.mandiant.com

"This is not a vulnerability exploit but a systematic exploitation of weak security architecture and identity design," said Stuart Carrera, a cybersecurity expert at Mandiant. "Organizations must treat the virtualization layer as Tier-0 critical infrastructure."

The Attack Chain

BRICKSTORM operates by infiltrating the control plane of vSphere, granting attackers administrative access to all managed ESXi hosts and virtual machines. Once inside, they can disable monitoring, deploy ransomware, or steal sensitive data without detection.

"The VCSA runs on Photon Linux and often hosts domain controllers or privileged access management solutions," Carrera explained. "Compromise here collapses all organizational security tiers."

Background: How BRICKSTORM Works

The malware exploits visibility gaps in the virtualization layer, which lacks support for standard endpoint detection and response (EDR) agents. Attackers rely on default configurations, weak passwords, and insufficient host-based enforcement to gain a foothold.

Mandiant's research highlights that no vendor vulnerability is involved. Instead, attackers leverage misconfigurations and poor identity practices. The attack chain typically begins with phishing or credential theft targeting vSphere administrators.

BRICKSTORM Malware Exploits VMware vSphere Weaknesses: Urgent Hardening Needed
Source: www.mandiant.com

What This Means: Urgent Hardening Required

Organizations must immediately secure their vSphere environments at both the application and operating system layers. Mandiant has released a vCenter Hardening Script that automates security configurations on Photon Linux.

"Default settings are insufficient," Carrera stressed. "Achieving Tier-0 security demands intentional customizations. The script enforces policies like disabling SSH, restricting API access, and enabling comprehensive logging."

Key Hardening Steps

  • Enforce multi-factor authentication (MFA) for all vSphere admin access
  • Segment virtualization management networks from production traffic
  • Regularly audit and revoke unused privileges
  • Deploy host-based intrusion detection on ESXi and Photon Linux

Internal Anchor Links

As BRICKSTORM evolves, experts predict more targeted attacks on virtualized infrastructure. CISA urges all organizations to apply these mitigations immediately. Failure to adapt could lead to widespread compromise of cloud and on-premises environments alike.