CISA Updates BRICKSTORM Malware Analysis Report

Banner for the Cybersecurity & Infrastructure Security Agency featuring the agency's logo and a digital graphic of a globe and network lines.

The Cybersecurity and Infrastructure Security Agency (CISA) released an update to its BRICKSTORM Backdoor Malware Analysis Report (MAR) developed with the National Security Agency and Canadian Centre for Cyber Security. The update includes analysis and detection signatures for a new BRICKSTORM variant that uses .NET Native Ahead-of-Time (AOT) compilation—making it more versatile and harder to detect.

Like previous BRICKSTORM samples, the variant has initiation and secure command and control capabilities that use multiple layers of encryption to hide its communications, but unlike other samples, it does not have built-in self-monitoring capabilities to enable persistence.

This update delves into the variant’s functionality and offers new YARA rules to support detection. CISA urges all organizations who use VMware vSphere, especially those in the Government Services and Facilities and Information Technology sectors, to review the updated MAR and implement mitigation measures.

Please share your thoughts with us through this this anonymous survey. We appreciate your feedback!


Discover more from #News247WorldPress

Subscribe to get the latest posts sent to your email.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from #News247WorldPress

Subscribe now to keep reading and get access to the full archive.

Continue reading

Discover more from #News247WorldPress

Subscribe now to keep reading and get access to the full archive.

Continue reading