CISA, in coordination with the NSA and Canada’s Cyber Security Centre, has identified threat actors deploying BrickStorm malware to compromise VMware vSphere servers, allowing attackers to maintain long-term unauthorized access while remaining undetected.
Affected Systems:
VMware vSphere servers, including vCenter and ESXi.
Windows servers on the same network (including domain controllers and other critical servers).
Security Risks
Infected systems may allow the BrickStorm malware to maintain persistent access, exfiltrate credentials and sensitive data, move laterally, and create hidden virtual machines, resulting in a high risk of prolonged network compromise.
Recommended Actions
The National Cyber Security Authority (NCSA) recommends the following actions to users and system administrators:
Upgrade VMware vSphere servers to the latest version.
Harden VMware vSphere environments.
Ensure proper network segmentation to restrict traffic from the DMZ to the internal network.
Disable RDP and SMB access from the DMZ to the internal network.