Skip to content

Google Discovers China-Linked UNC5221's Long-Term Malware Operation

Google's discovery reveals a sophisticated, long-running operation. The China-linked UNC5221 group exploited zero-day vulnerabilities and deployed a Go-based backdoor Trojan, BRICKSTORM.

In the picture we can see three boys standing near the desk on it, we can see two computer systems...
In the picture we can see three boys standing near the desk on it, we can see two computer systems towards them and one boy is talking into the microphone and they are in ID cards with red tags to it and behind them we can see a wall with an advertisement board and written on it as Russia imagine 2013.

Google Discovers China-Linked UNC5221's Long-Term Malware Operation

Google has uncovered a long-term malware operation by the China-linked UNC5221 group. The operation targeted key personnel at SaaS and outsourcing companies, aiming to steal intellectual property and gain unwanted infrastructure access.

The group exploited zero-day vulnerabilities to initiate attacks. They collected emails of key individuals using Microsoft Entra ID Enterprise Applications with or scopes. Once inside, they deployed a Go-based backdoor Trojan called BRICKSTORM, which functions as a SOCKS proxy and webserver, allowing stealthy access to systems and command execution.

BRICKSTORM malware primarily targets Linux and BSD-based appliances. Once deployed, it pivots to VMware systems, a favoured target of the UNC5221 group. The malware remained undetected in victims' systems for an average of 393 days.

Google's discovery highlights the need for robust cybersecurity measures. Adopting a TTP-based hunting approach can help detect such attacks, while stronger authentication protocols, such as multi-factor authentication, can prevent similar breaches in the future.

Read also:

Latest