Back
Technology
#BRICKSTORM#Malware#Cybersecurity#Data Leak#UNC5221#Corporate Security

BRICKSTORM: A New Threat Targeting US Corporate Data for Over a Year!

I was truly surprised when I heard this news! 😱 It's incredible that a new malware called 'BRICKSTORM', which has been siphoning off valuable data from US companies for over a year, has been discovered. The fact that legal, technology, and SaaS companies were the primary targets makes us reflect once again on our digital security.

T
TREND DIGEST
2025년 9월 25일2min read
BRICKSTORM: A New Threat Targeting US Corporate Data for Over a Year!
출처: futurecdn.net

Hello! Today, I've brought you some truly interesting and important security news. It's all about a new malware called 'BRICKSTORM'. I was genuinely intrigued when I came across this information. 😮

BRICKSTORM: Operating Covertly for Over a Year

According to a report released by Google's Threat Intelligence Group (GTIG), a new malware named 'BRICKSTORM' has been stealing data from US companies for over a year. What's astonishing is that this attack was conducted so covertly that it remained undetected for a long period.

It is suspected that a group known as 'UNC5221' is behind this malware. This group, known to be associated with China, is characterized by its quiet, covert operations and long-term infiltration. 🕵️‍♂️

Key Targets: Legal, Technology, and SaaS Companies

BRICKSTORM's attacks primarily targeted US legal, technology, and SaaS (Software as a Service) companies. Business Process Outsourcing (BPO) sectors were also not exempt. These companies likely became attractive targets for hackers due to the sensitive information and intellectual property they handle.

This attack aimed beyond merely stealing data; it also targeted espionage, intellectual property theft, and long-term infrastructure access. This can pose a serious threat to corporations.

Found this article helpful?

Never miss insights like this - delivered every morning

How Was This Possible?

UNC5221 specifically targeted zero-day vulnerabilities in Linux and BSD-based devices first. These devices are often omitted from asset inventories or excluded from central logging, providing attackers with a convenient foothold for infiltration. Using this initial access, attackers would then penetrate deeper into corporate networks and spread.

Efforts to Protect Our Digital Assets

Following this incident, security experts like Mandiant are urging for more robust authentication systems alongside threat hunting based on TTPs (Tactics, Techniques, and Procedures). Beyond common attacks like phishing or account compromise, it is becoming crucial to prepare for such sophisticated and covert malware attacks.

Regardless of a company's size, it is time for thorough security checks and system 강화 (strengthening) to protect our valuable digital assets. What are your thoughts on this news? It would be great to discuss the security threats around us together! 😊

Future Challenges

This BRICKSTORM incident demonstrates how sophisticated cyberattacks are becoming and how they can threaten our digital lives in unexpected ways. Maintaining vigilance against such threats and continuing security enhancement efforts will be necessary going forward.

Conclusion

While today's news may feel somewhat concerning, I hope that through this information, we can contribute to creating a safer digital environment. Always have a healthy and safe day! 💪✨

Was this article helpful?
Share