CISA Warns of Chinese BrickStorm Malware Targeting VMware Servers

Related

In Praise of CISA

Lately, the Cybersecurity and Infrastructure Security Agency (CISA) has...

Cybersecurity Leaders to Watch: Louisiana Healthcare

Louisiana’s healthcare sector depends on cybersecurity leaders who can...

Anthropic Unveils Claude Mythos to Find Critical Software Flaws Before Attackers Do

What happened Anthropic unveiled Claude Mythos Preview as the model...

Microsoft Commits $10 Billion to Expand AI and Cybersecurity Infrastructure in Japan

What happened Microsoft announced a $10 billion investment to expand...

Share

What happened

CISA reported that Chinese state-linked hackers are deploying new BrickStorm malware to compromise unpatched VMware servers and maintain persistent access.

Who is affected

Organizations running exposed or outdated VMware systems that support critical workloads.

Why CISOs should care

BrickStorm allows long-term access inside virtualized environments, which raises the risk of data theft, lateral movement, and operational disruption.

3 practical actions

  1. Patch vulnerable VMware servers and secure any exposed management interfaces.

  2. Hunt for indicators of compromise tied to BrickStorm and watch for unusual activity in virtual machine environments.

  3. Segment networks to limit access to critical systems if attackers gain entry.