Advertisement · 728 × 90
#
Hashtag
#unc5221
Advertisement · 728 × 90
Post image

#BRICKSTORM intel just landed: PRC actors camping in vCenter/ESXi + Windows. 🧱🕵️
F5 source-code drama raises the long-run 0-day odds, but the calendar + attribution lag are savage.

Our final call: 11% #UNC5221 gets publicly tied to a new 0-day before Dec 31. 🎯

#AlphaHunt #ZeroDay

1 0 1 0
Preview
Will UNC5221 pop a fresh zero-day before Dec 31? Updated! UNC5221 is an edge-focused PRC espionage actor repeatedly tied to zero-days (Ivanti 2023–2025; prior NetScaler). Edge products remained a major zero-day target in 2024. But public attributions…

UNC5221’s Q4 playbook: live on the edge, ship a zero-day, let attribution lag do the rest. We’ve got it at 32% before 12/31. Betting line or blind spot? 🧮🔎

Read → blog.alphahunt.io/will-unc5221...

#AlphaHunt #ZeroDay #UNC5221

0 0 0 0
Post image

What if spies stole the source code for F5's BIG-IP?

China-linked espionage group #UNC5221 spent a year inside, stealing code and vulnerability data. 

Read the full threat analysis and mitigation steps now 👇

https://tinyurl.com/5xy2weff

0 0 0 0
Preview
Will UNC5221 pop a fresh zero-day before Dec 31? Updated! UNC5221 is an edge-focused PRC espionage actor repeatedly tied to zero-days (Ivanti 2023–2025; prior NetScaler). Edge products remained a major zero-day target in 2024. But public attributions…

UNC5221 stuffing stockings at the edge? Updated odds: 32% they pop a fresh zero‑day before 12/31. Attribution lags, year‑end windows don’t. 🔥🛡️

Peek the forecast—then subscribe for the follow-through. -> blog.alphahunt.io/will-unc5221...

#AlphaHunt #CyberSecurity #ZeroDay #UNC5221

1 0 0 0
Post image

UNC5221’s Q4 playbook: live on the edge, ship a zero-day, let attribution lag do the rest. We’ve got it at 32% before 12/31. Betting line or blind spot? 🧮🔎

Read → blog.alphahunt.io/will-unc5221...

#AlphaHunt #ZeroDay #UNC5221

0 0 0 0
F5 Discloses Major Security Breach

~Zscaler~
Nation-state actor UNC5221 breached F5, exfiltrating BIG-IP source code and internal zero-day vulnerability documentation.
-
IOCs: BRICKSTORM, UNC5221
-
#F5 #ThreatIntel #UNC5221

0 0 0 0
Post image

F5 nel mirino di attori statali: il codice sorgente di BIG-IP è stato compromesso. Un’ipotesi di threat actor
il blog: insicurezzadigitale.com/f5-nel-mirin...

#cybersecurity #brickstorm #databreach #f5 #unc5221

0 0 0 0
Preview
China-linked groups are using stealthy malware to hack software suppliers Google, which disclosed the campaign, said it was one of the most significant supply-chain hacks in recent memory.

与中国有联系的团体部署隐形恶意软件来渗透软件供应商系统

#中国 #恶意软件 #网络安全 #UNC5221

www.cybersecuritydive.com/news/china-e...

1 0 0 0
Google warns of Brickstorm malware targeting US firms for over a year

Google warns of Brickstorm malware targeting US firms for over a year

Google’s Threat Intel team says the Chinese‑linked UNC5221 used the Brickstorm malware to spy on US legal, technology and SaaS firms, with an average dwell time of 393 days. getnews.me/google-warns-of-bricksto... #brickstorm #unc5221 #cybersecurity

0 0 0 0
Post image

BRICKSTORM new Windows variant expands targeting of legal and technology sectors Threat Group – China-nexus UNC5221 Threat Type – Espionage backdoor and post-exploitation toolkit Exploited Vuln...

#$BRICKSTORM #UNC5221 #DNS-over-HTTPS #Ivanti #Cloud-fronted-C2 #Malware

Origin | Interest | Match

0 0 0 0
Original post on esecurityplanet.com

Google Warns of BRICKSTORM Malware Driving Supply Chain Intrusions China-linked hackers use BRICKSTORM malware to hit tech, SaaS, and legal firms, threatening the US supply chain. The post Google W...

#News #Threats #BRICKSTORM #malware #Google […]

[Original post on esecurityplanet.com]

1 0 1 0
Preview
China-linked hackers use ‘BRICKSTORM’ backdoor to steal IP Researchers said the BRICKSTORM campaign stood out because of its “sophistication, evasion of advanced enterprise security defenses and focus on high-value targets.”

China-linked hackers are using a backdoor called BRICKSTORM to steal intellectual property from law firms, SaaS, and tech companies, targeting executive inboxes. Mandiant attributes it to UNC5221.
#BRICKSTORM #China #Mandiant #UNC5221 #CyberSecurity #Infosec #IPTheft therecord.media/china-linked...

2 0 0 0
Preview
Chinese Spies Lurked in Networks for 393 Days, Hunted for Zero-Day Intel

Chinese Hackers Lurked Nearly 400 Days in Networks With Stealthy BrickStorm Malware Google’s Threat Intelligence Group and Mandiant link the BrickStorm campaign to UNC5221, warning that hackers a...

#Nation-State #China #China #APT #Featured #UNC5221 #Zero-Day

Origin | Interest | Match

0 0 0 0
Preview
Chinese Spies Lurked in Networks for 393 Days, Hunted for Zero-Day Intel

Chinese Spies Lurked in Networks for 393 Days, Hunted for Zero-Day Intel Google’s Threat Intelligence Group and Mandiant have shared findings on a recent BrickStorm campaign linked to UNC5221. Th...

#Nation-State #China #China #APT #UNC5221 #Zero-Day

Origin | Interest | Match

0 0 0 0
BRICKSTORM Espionage Campaign

~Mandiant~
Suspected China-nexus actor UNC5221 uses the BRICKSTORM backdoor for long-term, stealthy espionage against tech and legal sectors by targeting network appliances.
-
IOCs: (None identified)
-
#BRICKSTORM #ThreatIntel #UNC5221

0 0 0 0
Post image

Mandiant scopre la campagna BrickStorm di UNC5221: spionaggio cinese contro aziende USA con backdoor su VMware, furto credenziali e zero-day.

#apt #backdoor #BrickStorm #cina #mandiant #UNC5221 #vmware
www.matricedigitale.it/2025/09/24/b...

0 0 0 0
Preview
Questions mount as Ivanti tackles another round of zero-days The besieged security vendor maintains the latest exploited vulnerabilities in its products are entirely linked to unspecified security issues in open-source libraries. Some researchers aren’t buying ...

Two new zero-day vulnerabilities (CVE-2025-4427 & 4428) in their Endpoint Manager Mobile software are being actively exploited by nation-state hackers.

Researchers say it’s Ivanti’s code to blame, not open-source.

#ZeroDay #Cybersecurity #RiskManagement #SupplyChainSecurity #CVE20254427 #UNC5221

0 0 0 0
China-Nexus Exploits Ivanti EPMM CVE-2025-4428

~Eclecticiq~
UNC5221 actively exploits Ivanti EPMM (CVE-2025-4428) for RCE & data exfil.
-
IOCs: 64. 52. 80. 21, 103. 244. 88. 125, 27. 25. 148. 183
-
#CVE20254428 #Ivanti #ThreatIntel #UNC5221

0 0 0 0
Preview
Latest Sophisticated Attacks and Key Vulnerabilities Explore the latest advancements in cybersecurity, highlighting sophisticated threats, critical vulnerabilities, and the importance of robust security measures to protect sensitive sectors globally.

"Infrastructure risks have also been prominent, w/vulnerabilities in ASUS routers & critical ICS devices from Schneider Electric & Yokogawa exposing sectors like #energy & manufacturing to..." digitalfrontierpartners.com.au/news/latest-... RU #APT29 Android #NFC China #UNC5221 #SNOWLIGHT #TONESHELL

0 0 0 0
Preview
Critical Ivanti VPN Vulnerability Exploited in the Wild by Suspected Espionage Group UNC5221 A Critical ICS VPN flaw is actively exploited by a suspected China-nexus threat actor that relies on the SPAWN malware family and two new families.

A critical vulnerability impacting Ivanti Connect Secure VPN appliances initially believed to be a low-risk flaw is being actively exploited to achieve remote code execution.

#Ivanti #Vulnerability #Cyberespionage #UNC5221 #VPN

0 0 0 0

2/ 🚨 Urgent #Ivanti Patch Alert: A critical #RCE zero-day is being actively exploited by suspected #China-nexus group #UNC5221, who are deploying new malware (TRAILBLAZE, BRUSHFIRE).

0 0 1 0
Preview
UNC5221's Exploitation of Ivanti Connect Secure: A Wake-Up Call for Cybersecurity | The DefendOps Diaries UNC5221 exploits Ivanti Connect Secure vulnerabilities, highlighting critical cybersecurity gaps and the need for robust defenses.

UNC5221 just turned a hidden flaw in Ivanti Connect Secure into a cyber heist—using zero-day exploits and stealth malware to breach critical systems. Could your network be the next target?

#unc5221
#ivanti
#cybersecurity
#zeroday
#malware

0 0 0 0
Preview
Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457) | Google Cloud Blog

🚨CVE-2025-22457  
@Mandiant confirms critical Ivanti Connect Secure RCE vulnerability 
📌CVE: bit.ly/4iTpKdD  
📊136K+ services found magnify.modat.io  
Basic Query bit.ly/3E50TEB 
Device DNA bit.ly/4jcSuOV 
#ModatMagnify #CVE202522457 #Ivanti #ThreatIntel #UNC5221 #APT #DFIR

2 1 0 0
Preview
Warning: New Malware Emerges in Attacks Exploiting Ivanti VPN Vulnerabilities Chinese hackers are exploiting zero-days in Ivanti VPNs, stealing sensitive data

⚠️ Warning - #Chinese espionage group #UNC5221 attacking Ivanti Connect Secure VPN & Policy Secure devices, and using custom web shells like BUSHWALK, CHAINLINE, FRAMESTING, and LIGHTWIRE variant.
thehackernews.com/2024/02/warn...
Patch ASAP!
#cybersecurity #hacking

1 0 0 0