CISA: Chinese hackers used Brickworm malware to breach critical US infrastructure

CISA: Chinese hackers used Brickworm malware to breach critical US infrastructure

Chinese state-sponsored actors deploy Brickworm malware to infiltrate government and IT networks worldwide

Malware targets VMware vSphere and Windows, enabling persistence, file manipulation, and Active Directory compromise

CISA warns of long-term espionage and sabotage risks; China denies accusations, calling the US a “cyber-bully"

Chinese state-sponsored threat actors have been using Brickworm malware against government organizations around the world - maintaining access, exfiltrating files, and eavesdropping.

This is according to a joint report published by the US Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Canadian Centre for Cyber Security. The report outlines how the malware operates based on the analysis of eight samples obtained from victim networks.

In this, it was said that PRC hackers are targeting “government and information technology” organizations, without detailing who the victims are, or where they’re located. At the same time, Crowdstrike said it observed this being used against an Asia-Pacific government organization.

Catch the price drop- Get 30% OFF for Enterprise and Business plans The Black Friday campaign offers 30% off for Enterprise and Business plans for a 1- or 2-year subscription. It’s valid until December 10th, 2025. Customers must enter the promo code BLACKB2B-30 at checkout to redeem the offer.

Manipulating files

To break into target networks, the threat actors would go for VMware

Source: https://www.techradar.com/pro/security/chinese-hackers-used-brickworm-malware-to-breach-critical-us-infrastructure

TPRM report: https://www.rankiteo.com/company/cisa

"id": "cis1764943192",
"linkid": "cisa",
"type": "Cyber Attack",
"date": "2025-12-05T00:00:00.000Z",
"severity": "100",
"impact": "8",
"explanation": "Attack that could bring to a war"
{'incident': {'affected_entities': [{'customers_affected': None,
                                     'industry': ['Government', 'IT'],
                                     'location': ['Asia-Pacific', 'Worldwide'],
                                     'name': None,
                                     'size': None,
                                     'type': ['Government',
                                              'Information Technology']}],
              'attack_vector': 'VMware vSphere and Windows exploitation',
              'data_breach': {'data_encryption': None,
                              'data_exfiltration': 'Yes',
                              'file_types_exposed': None,
                              'number_of_records_exposed': None,
                              'personally_identifiable_information': None,
                              'sensitivity_of_data': 'High (government and IT '
                                                     'networks)',
                              'type_of_data_compromised': 'Files, '
                                                          'eavesdropping data'},
              'description': 'Chinese state-sponsored threat actors have been '
                             'using Brickworm malware against government '
                             'organizations around the world - maintaining '
                             'access, exfiltrating files, and eavesdropping. '
                             'The malware targets VMware vSphere and Windows, '
                             'enabling persistence, file manipulation, and '
                             'Active Directory compromise. CISA warns of '
                             'long-term espionage and sabotage risks.',
              'impact': {'brand_reputation_impact': None,
                         'conversion_rate_impact': None,
                         'customer_complaints': None,
                         'data_compromised': 'Files exfiltrated, eavesdropping',
                         'downtime': None,
                         'financial_loss': None,
                         'identity_theft_risk': None,
                         'legal_liabilities': None,
                         'operational_impact': 'Long-term network persistence',
                         'payment_information_risk': None,
                         'revenue_loss': None,
                         'systems_affected': ['VMware vSphere',
                                              'Windows',
                                              'Active Directory']},
              'initial_access_broker': {'backdoors_established': None,
                                        'data_sold_on_dark_web': None,
                                        'entry_point': None,
                                        'high_value_targets': None,
                                        'reconnaissance_period': None},
              'motivation': ['Espionage', 'Sabotage'],
              'post_incident_analysis': {'corrective_actions': None,
                                         'root_causes': None},
              'ransomware': {'data_encryption': None,
                             'data_exfiltration': None,
                             'ransom_demanded': None,
                             'ransom_paid': None,
                             'ransomware_strain': None},
              'references': [{'date_accessed': None,
                              'source': 'CISA, NSA, Canadian Centre for Cyber '
                                        'Security',
                              'url': None},
                             {'date_accessed': None,
                              'source': 'Crowdstrike',
                              'url': None}],
              'regulatory_compliance': {'fines_imposed': None,
                                        'legal_actions': None,
                                        'regulations_violated': None,
                                        'regulatory_notifications': None},
              'response': {'adaptive_behavioral_waf': None,
                           'communication_strategy': None,
                           'containment_measures': None,
                           'enhanced_monitoring': None,
                           'incident_response_plan_activated': None,
                           'law_enforcement_notified': None,
                           'network_segmentation': None,
                           'on_demand_scrubbing_services': None,
                           'recovery_measures': None,
                           'remediation_measures': None,
                           'third_party_assistance': None},
              'threat_actor': 'Chinese state-sponsored actors',
              'title': 'Chinese State-Sponsored Actors Deploy Brickworm '
                       'Malware to Infiltrate Government and IT Networks '
                       'Worldwide',
              'type': 'Malware Attack'}}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.