• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 14,000 monthly views and 157,000 clicks per month, as per Google Analytics! Thank you for your support! 🎉

Google: Brickstorm Malware Steals U.S. Organizations’ Data for Over a Year

johny899

New Member
Content Writer
Messages
369
Reaction score
3
Points
23
Balance
$395.6USD
According to Google, some shocking information: malware named Brickstorm was pilfering data from U.S. organizations for more than a year. That's right, hackers had access to the system for well over a year and nobody noticed.

What exactly is Brickstorm?​

Brickstorm is classified as a type of espionage malware. Unlike ransomware that locks up files and demands a ransom to give your files back or for each file you ransom, Brickstorm quietly escalates and moves its stealth. The malware enters systems, hides, and then slowly and quietly steals important or sensitive information.

Why is this any scarier you ask? Typically, once you learn of stealthy malware, the damage has already taken place.

So who is Brickstorm attacking?​

According to Google, the hacks were primarily directed at U.S. government, non-profit and other important organizations. These are types of organizations that have a lot of sensitive information.

What is most surprising? The malware was active for more than a year. In other words:

• Hackers had intelligence and knowledge
• Victims had no idea it occurred.

What does Brickstorm do?​

Brickstorm uses different tactics and techniques that are undetectable such as,

• Custom loaders that are used to stealthily deliver malware
• Backdoors that are opened so the hackers can return at any time they wish
• Configurations to exfiltrate files quietly,
• Persistence mechanisms, that are designed to maintain malware through a reboot

How to make sure you are safe​

So how do we protect ourselves from some of these types of attacks? Here are some straightforward steps:

• Keep your software updated to patch vulnerabilities.
• Use multiple factor authentication (MFA) so that if your password is stolen it is useless.
• Look at your network regularly and check for unusual or suspicious activity.
• Train your staff on phishing and avoid clicking on bad links.

The conclusion​

In conclusion, Brickstorm is malware used to steal data from U.S. organizations for at least a year, all while remaining undetected. Not all hackers are loud, and some like to take their time to lurk and steal data.

My recommendation is, "act as if hackers are always knocking on the door and work to fortify your defenses because if a hacker can remain undetected for an entire year, you need to monitor on a daily basis."
 
Top