BrickStorm Malware: Anatomy of a Stealth Linux Backdoor Targeting Modern Infrastructure

Jayesh Gangadas Patel
By Jayesh Gangadas Patel
Principle Threat Researcher, Versa Networks
February 5, 2026
in
Share
Follow

Executive Summary

BrickStorm is a highly stealthy Linux backdoor designed for long-term, targeted cyber-espionage. Brickstorm is closely associated with Cyber Espionage group UNC5221, which is known for exploiting zero-days vulnerability in network edge appliances like Ivanti, F5 and MiTRE breach. Unlike commodity malware, BrickStorm is deployed post-compromise, operates largely in memory, and uses a modular architecture with custom encrypted command-and-control (C2). Its focus on Linux servers, network appliances, and embedded systems reflects a broader trend: attackers increasingly target infrastructure layers where visibility and detection are weakest.

BrickStorm exemplifies the challenges security teams face in detecting low-noise, high-discipline threats operating below the endpoint layer—and highlights the need for behavioral monitoring, memory visibility, and outbound traffic control across Linux environments.

Why BrickStorm Matters to Defenders?

The same can be said about any malware, but brickstorm matters as it exemplifies in articulating its attack around Unix platform and since, Unix now underpins most of the Cloud workloads, Identity Infrastructure, CI/CD Pipelines, Network and Security Appliances, it bottlenecks critical infrastructure, making it more critical for defenders.

Threat Overview

BrickStorm is not designed to spread widely as the most malwares do or generate revenue. Instead, it enables persistent, covert access to exactly these high-value systems—often for months—while evading traditional file-based security controls, indicating clearly some state-sponsored threat actors behind the operation, that would help creator gain valuable inputs and control critical infrastructures.

BrickStorm characteristics at a glance:

🎯 Specializes in Zero-day exploits via Targeted deployment (not mass exploitation)

🧠 Memory-resident execution, to stay undetected.

🧩 Modular, on-demand capabilities, to generate low noise.

🔐 Custom encrypted C2, helping to stay hidden.

🕰️ Long dwell time, minimal forensic artifacts.

Initial Access: Not the Malware’s Job

Malware has been observed in post-exploit activities, but the threat group deploying Brickstorm has been notoriously associated with exploiting zero-day vulnerabilities in network devices like F5 and Ivanti Firewalls.

Observed access vectors include:

  • Exploited public-facing services
  • Compromised VPN or network appliances
  • Stolen SSH credentials
  • Lateral movement from another internal host

This separation between initial access tooling and persistence tooling is common in advanced threat operations.

Key takeaway: BrickStorm is not noisy and hence require detection expertise that would help locate stealth operation. Once deployed, it blends into normal system behavior. With these characteristics it is essential organization watch out for mitigating or detecting BrickStorm by implementing

  • Create/Update/Patch edge devices inventory and other appliances of any vulnerabilities.
  • Monitor network traffic for any indication of unusual DNS-over-HTTPs traffic.
  • Enforce MFA and perform credentials scrubbing to filter out suspicious credentials.
  • Monitor VM Cloning activities, especially for VMWare enterprise tools.
  • Sanitize compromised VM’s and only build new VM from verified images.

How Versa does it?

Sample Detection on ATP with Threatfeed in Versa Platform

Preventing data exfiltration

Once BrickStorm activity is detected, Versa automatically moves from visibility to prevention by enforcing inline security controls at the network edge. Suspicious outbound C2 and exfiltration attempts are blocked using a combination of Advanced Threat Protection (ATP), IPS signatures, and URL/IP/DNS filtering to stop malware communications in real time. This ensures that even if the malware executes in memory and avoids file-based defenses, its ability to beacon out and exfiltrate sensitive data is immediately disrupted through policy-driven enforcement.

References

[1] https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign

Credits – Naveen Vakkanti

Recent Posts













Gartner Research Report

2025 Gartner® Magic Quadrant™ for SASE Platforms

Versa has for the third consecutive year been recognized in the Gartner Magic Quadrant for SASE Platforms and is one of 11 vendors included in this year's report.