vSphere and BRICKSTORM Malware: A Defender's Guide
This article details Mandiant and GTIG findings on persistent BRICKSTORM operations that target the VMware vSphere control plane (VCSA and ESXi) and the Photon OS, and it prescribes a four-phase, infrastructure-centric hardening strategy to prevent and detect those intrusions. It emphasizes Photon OS–level firewalling and logging (auditd, AIDE), strict identity/network segmentation (PAWs, PAM, Zero Trust), VM encryption, and forensic remote logging to expose actions such as startup script injections and VMDK theft. #BRICKSTORM #VCSA
BRICKSTORM targets VMware vSphere control plane (VCSA, ESXi) and Photon OS for deep persistence. Key defenses include Photon OS firewalling, strict segmentation, VM encryption, and forensic remote logging. #VMwareSecurity #PhotonOS #BRICKSTORM