Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

How to reduce financial stress during the holiday season

December 13, 2025

The Indigenous women behind Mexican President Claudia Sheinbaum’s ‘most stylish’ looks

December 12, 2025

Online rise of Eastern Orthodoxy tests its clergy

December 12, 2025
Facebook X (Twitter) Instagram
Trending
  • How to reduce financial stress during the holiday season
  • The Indigenous women behind Mexican President Claudia Sheinbaum’s ‘most stylish’ looks
  • Online rise of Eastern Orthodoxy tests its clergy
  • Hanukkah is Judaism’s ‘festival of lights’
  • Skydiver dangles at 15,000 feet after parachute tangles on plane’s tail
  • Buenos Aires dance hall guarantees tango sessions with pro partners
  • MacKenzie Scott’s Latest Gifts Make Her America’s Third Most Generous Philanthropist
  • UNESCO gives a shout-out to Switzerland’s yodeling by adding it to list of cultural heritage
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Saturday, December 13
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » MITRE Hackers’ Backdoor Has Targeted Windows for Years
Cybersecurity

MITRE Hackers’ Backdoor Has Targeted Windows for Years

By adminApril 17, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 132


Newly identified versions of the BrickStorm backdoor used in the MITRE hack in early 2024 are targeting Windows environments, cybersecurity firm Nviso warns.

To hack MITRE, a Chinese APT tracked as UNC5221 exploited two zero-day vulnerabilities in an Ivanti Connect Secure VPN as early as December 31, 2023, following up with fingerprinting in January 4, 2024, and lateral movement and malware deployment in the next few days.

The hackers deployed the Linux version of the BrickStorm backdoor on VMware vCenter hosts, along with the BeeFlush and WireFire web shells, and exfiltrated data two weeks later, using the BushWalk web shell. The intrusion was discovered in April 2024.

A fresh Nviso technical analysis (PDF) shows that UNC5221 has been targeting European organizations with Windows variants of BrickStorm since at least 2022.

The low-noise backdoor enables attackers to browse the file system, manipulate files and folders, and tunnel network connections, while evading detection by using DoH (DNS over HTTPS) to resolve command-and-control (C&C) servers.

Nviso discovered two samples of BrickStorm for Windows, written in Go and employing scheduled tasks for persistent execution. They lack support for command execution, but employ network tunnelling and stolen credentials to abuse RDP and SMB for similar capabilities.

For file manipulation, the backdoor uses an HTTP API with support for file download, upload, rename, and delete actions. It also enables attackers to create and delete folders, as well as to list their content.

The Windows variants of BrickStorm support TCP, UDP and ICMP relaying for network tunneling, and have been deployed on domain-joined devices using stolen credentials.

Advertisement. Scroll to continue reading.

The backdoor’s C&C communication is performed over a single, multiplexed connection, which allows it to perform multiple concurrent activities. HashiCorp’s Yamux library is used to establish the encrypted connection.

Public cloud services such as Cloudflare Workers and Heroku applications are used to hide the infrastructure, while the abuse of Cloudflare, Google, NextDNS, and Quad9 for domain name resolution circumvents regular network-level DNS monitoring.

“Although BrickStorm’s file manager and network tunneling functionality could be considered basic, their effectiveness remains undoubted. These recent discoveries of several years-old adversary capabilities, alongside evidence of infrastructure maintenance, highlight the need for at-risk industries to bolster their security posture and continuously audit their environment for rare/uncommon activity,” Nviso notes.

Related: Chinese APT Weaver Ant Targeting Telecom Providers in Asia

Related: Chinese Hacking Group MirrorFace Targeting Europe

Related: Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts

Related: New Windows Zero-Day Exploited by Chinese APT: Security Firm



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply

Don't Miss
Billionaires

MacKenzie Scott’s Latest Gifts Make Her America’s Third Most Generous Philanthropist

December 11, 2025

Photo by JORG CARSTENSEN/dpa/AFP via Getty ImagesOn Tuesday, billionaire philanthropist MacKenzie Scott published her yearly…

Indonesian Billionaires Cash In On Gold Surge

December 10, 2025

Kalshi’s Cofounder Is Now World’s Youngest Self-Made Woman Billionaire

December 2, 2025

Billionaire Kwek Leng Beng’s CDL Expands In London With $370 Million Holiday Inn Deal

December 2, 2025
Our Picks

How to reduce financial stress during the holiday season

December 13, 2025

The Indigenous women behind Mexican President Claudia Sheinbaum’s ‘most stylish’ looks

December 12, 2025

Online rise of Eastern Orthodoxy tests its clergy

December 12, 2025

Hanukkah is Judaism’s ‘festival of lights’

December 12, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.