Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese Spies Lurked in Networks for 393 Days, Hunted for Zero-Day Intel

Chinese Spies Lurked in Networks for 393 Days, Hunted for Zero-Day Intel

Posted on September 25, 2025September 25, 2025 By CWS

Researchers in Google’s Menace Intelligence Group and Mandiant unit have analyzed a latest Chinese language cyberespionage marketing campaign the place the hackers have managed to dwell in compromised networks for a whole bunch of days to acquire helpful info. 

The assaults concerned BrickStorm, a stealthy backdoor utilized by a Chinese language APT tracked as UNC5221 in a 2023 assault focusing on MITRE. 

The newest BrickStorm marketing campaign was linked by Google researchers to UNC5221, but in addition to different associated Chinese language risk actors. Whereas UNC5221 is usually reported to be the identical as Silk Hurricane, the researchers don’t consider them to be the identical. 

The marketing campaign has been monitored by Mandiant since March 2025, with the attackers focusing on industries equivalent to authorized providers, software-as-a-service (SaaS), expertise, and enterprise course of outsourcing (BPO). 

On common, the cyberspies spent 393 days within the focused networks. This has in lots of circumstances made it troublesome for the researchers to ascertain the preliminary entry vector, however in at the least one case the risk actor is believed to have exploited an Ivanti product zero-day vulnerability. 

The attackers have deployed the BrickStorm malware on numerous kinds of home equipment, a lot of which don’t help conventional EDR and different safety options. 

Mandiant has seen BrickStorm on Linux- and BSD-based home equipment. Current studies indicated {that a} Home windows model of the malware has additionally been round, however Mandiant has not seen it.

“Whereas BRICKSTORM has been discovered on many equipment varieties, UNC5221 constantly targets VMware vCenter and ESXi hosts. In a number of circumstances, the risk actor deployed BRICKSTORM to a community equipment previous to pivoting to VMware techniques,” Mandiant defined. “The actor moved laterally to a vCenter server within the atmosphere utilizing legitimate credentials, which have been probably captured by the malware operating on the community home equipment.”Commercial. Scroll to proceed studying.

The newest BrickStorm marketing campaign has been geared toward high-value targets and its aim has not been restricted to conventional cyberespionage. 

As an alternative, the Chinese language hackers leveraged the entry they obtained to pivot to the downstream prospects of compromised SaaS suppliers. As well as, Mandiant believes they’ve used a number of the stolen info to determine zero-day vulnerabilities in enterprise applied sciences.

“As a part of this intrusion marketing campaign, the risk actors are stealing proprietary supply code and different mental property associated to enterprise applied sciences that many different corporations use,” defined Charles Carmakal, CTO, Mandiant Consulting, Google Cloud. “ We consider the risk actors are analyzing the stolen supply code to seek out flaws and zero-day vulnerabilities to use in enterprise expertise merchandise.”

“It’s essential to know there’s direct victims after which there’s downstream organizations. By growing zero-days for these enterprise merchandise, the risk actors can then use them to focus on downstream corporations that use this expertise,” Carmakal advised SecurityWeek.

Associated: Particulars Emerge on Chinese language Hacking Operation Impersonating US Lawmaker

Associated: Chinese language Silk Hurricane Hackers Concentrating on A number of Industries in North America

Associated: Net Internet hosting Corporations in Taiwan Attacked by Chinese language APT for Entry to Excessive-Worth Targets

Security Week News Tags:Chinese, days, Hunted, Intel, Lurked, Networks, Spies, ZeroDay

Post navigation

Previous Post: Cisco IOS and XE Vulnerability Let Remote Attacker Bypass Authentication and Access Sensitive Data
Next Post: COLDRIVER APT Group Uses ClickFix To Deliver a New PowerShell-Based Backdoor BAITSWITCH

Related Posts

Google’s  Billion Wiz Deal Draws DOJ Antitrust Scrutiny: Report Google’s $32 Billion Wiz Deal Draws DOJ Antitrust Scrutiny: Report Security Week News
ClickFix Attacks Against macOS Users Evolving ClickFix Attacks Against macOS Users Evolving Security Week News
In Other News: HashJack AI Browser Attack, Charming Kitten Leak, Hacker Unmasked In Other News: HashJack AI Browser Attack, Charming Kitten Leak, Hacker Unmasked Security Week News
EU Sets February Deadline for Verdict on Google’s B Wiz Acquisition EU Sets February Deadline for Verdict on Google’s $32B Wiz Acquisition Security Week News
TransUnion Data Breach Impacts 4.4 Million TransUnion Data Breach Impacts 4.4 Million Security Week News
In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News