Have you ever thought about how hackers can stay hidden in a system for months without detection? That's what UNC5221 is doing right now. They are a stealthy hacking group targeting certain U.S. legal, technology, SaaS, and business companies, where they are using malware called BRICKSTORM.
• Can execute commands on a host machine
• It can organize files
• Can be a network tunnel to move around internally
• Can run on Linux and BSD servers
It can even communicate with its command-and-control server via WebSockets to help it go undetected by regular security tools.
• Steal passwords with BRICKSTEAL
• Copy virtual servers for critical-related information
• Remain undetected with in-memory changes that do not require a server reboot to be enacted
Some versions of BRICKSTORM will wait months before contacting the hackers, making detection even harder.
What is BRICKSTORM?
BRICKSTORM differs from regular malware in that it:• Can execute commands on a host machine
• It can organize files
• Can be a network tunnel to move around internally
• Can run on Linux and BSD servers
It can even communicate with its command-and-control server via WebSockets to help it go undetected by regular security tools.
How UNC5221 Gets In
UNC5221 typically compromises Ivanti Connect Secure systems that they can identify aka drift detect weaknesses, to penetrate networks. Once inside, they are capable of:• Steal passwords with BRICKSTEAL
• Copy virtual servers for critical-related information
• Remain undetected with in-memory changes that do not require a server reboot to be enacted
Some versions of BRICKSTORM will wait months before contacting the hackers, making detection even harder.