Legal Services Industry Targeted by BRICKSTORM

Robinson+Cole Data Privacy + Security Insider
Contact

The Mandiant and Google Threat Intelligence Group has been responding to and monitoring malware dubbed BRICKSTORM targeting “a range of industry verticals, most notably legal services, Software as a Service (SaaS) providers, Business Process Outsourcers (BPOs), and Technology.” According to Mandiant/Google, “the value of these targets extends beyond typical espionage missions, potentially providing data to feed development of zero-days and establishing pivot points for broader access to downstream victims.”

Mandiant/Google believe the threat actors behind BRICKSTORM are closely related “China-nexus threat clusters.” The threat actors are using highly sophisticated means, including exploiting zero-day vulnerabilities targeting network appliances. The threat actors appear to have the goal of

long-term stealthy access by deploying backdoors on appliances that do not support traditional endpoint detection and response (EDR) tools. The actor employs methods for lateral movement and data theft that generate minimal to no security telemetry. This, coupled with modifications to the BRICKSTORM backdoor, has enabled them to remain undetected in victim environments for 393 days, on average.

To respond to the threat, Mandiant “strongly encourages organizations to reevaluate their threat model for appliances and conduct hunt exercises for this highly evasive actor.” In order to assist organizations to hunt and protect, Mandiant has provided details on the threat actor lifestyle, including how the threat actor evades detection upon initial intrusion by using anti-forensic tools, establishes a foothold in the victim’s system, escalates privileges, moves laterally, and establishes persistence and completes its mission.

Mandiant has provided hunting guidance, a scanner script for BRICKSTORM, and other mitigation techniques that it urges organizations to consider. If your organization is part of the target industries, including legal services, prioritize hunting and protecting from BRICKSTORM.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations. Attorney Advertising.

© Robinson+Cole Data Privacy + Security Insider

Written by:

Robinson+Cole Data Privacy + Security Insider
Contact
more
less

What do you want from legal thought leadership?

Please take our short survey – your perspective helps to shape how firms create relevant, useful content that addresses your needs:

Robinson+Cole Data Privacy + Security Insider on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide