Related Posts
Subscribe via Email
Subscribe to our blog to get insights sent directly to your inbox.
The BRICKSTORM malware campaign, attributed to Chinese state-sponsored threat actors and detailed in a joint CISA, NSA, and FBI advisory on December 4, 2025, represents the latest evolution in a long-running cyber-espionage operation targeting public-sector entities and their technology providers. While the tools and techniques are sophisticated, what’s most notable is that this campaign is not new—it is a continuation and refinement of tactics observed as early as 2022 and later tracked by Mandiant under threat clusters UNC3886 and UNC5221.
These actors specialize in exploiting systems often overlooked by traditional endpoint security tools, such as hypervisors, firewall appliances, and remote access infrastructure. BRICKSTORM builds on known behaviors: deploying custom malware on edge appliances, using DNS-over-HTTPS (DoH) for stealthy command-and-control, and harvesting credentials for long-term persistence and access into cloud environments.
Reports from Google Cloud's Mandiant and third-party threat intelligence sources including Proofpoint and NVISO reinforce that this isn’t a novel campaign—but rather a maturing one, benefiting from a lack of patch hygiene and insufficient logging in high-privilege infrastructure. Public-sector leaders should treat this as a wake-up call to hunt for existing compromise and harden often-neglected systems.
The December 4th, 2025 joint alert from CISA, NSA, and the FBI makes it clear: the BRICKSTORM malware campaign represents a methodical, state-sponsored effort to infiltrate the backbone of public-sector infrastructure. Targeting virtualization platforms, edge devices, and cloud environments, not traditional endpoints, these attackers are bypassing typical security layers and maintaining persistent, covert access to critical systems. This threat is not speculative. It’s active, ongoing, and directed at the systems governments rely on to deliver public services and protect sensitive data. With U.S. government and defense entities explicitly named as targets, the campaign underscores how the public sector is being prioritized by foreign intelligence services for long-term espionage and operational disruption. This is not merely an IT concern, it’s a strategic risk to national security, continuity of government, and the trust placed in public institutions.
The BRICKSTORM malware campaign is impacting multiple critical segments across the public and IT sectors. Based on the CISA alert and supporting intelligence, targeted and at-risk industries include:
This campaign’s breadth illustrates its strategic intent: to quietly infiltrate and persist within the digital supply chains of government services.
Based on the U.S. Department of Defense Malware Analysis Report on BRICKSTORM, security teams should investigate the following signs of compromise:
If you suspect BRICKSTORM activity or operate vulnerable infrastructure, take the following steps without delay:
BRICKSTORM isn’t a debut, it’s a calculated escalation in a campaign we’ve been tracking closely. Earlier this year, we anticipated a rocky close to 2025 as the Chinese government wraps up its 14th Five-Year Plan, and if recent activity is any indication, they intend to finish strong. This latest wave of attacks reflects a strategic push to consolidate cyber intelligence gains across government, tech, and critical infrastructure. Public-sector leaders should view BRICKSTORM not as a one-off threat, but as a signal: adversaries are evolving their playbook and targeting the seams in hybrid environments. Now’s the time to harden your edge, align teams around persistent detection, and lean into threat intelligence collaboration.
If you need support strengthening detection and response for campaigns like BRICKSTORM, consult with the experts at NuHarbor.
Don't miss another article. Subscribe to our blog now.
Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.
Subscribe to our blog to get insights sent directly to your inbox.