← Back to blog

Hardening VMware vSphere Against BRICKSTORM: A Defender's Guide

Mandiant (part of Google Cloud) just published a comprehensive defender’s guide on securing VMware vSphere environments against the BRICKSTORM backdoor and associated malware activity.

PRC-Nexus threat actors are targeting the virtualization layer, specifically the vCenter Server Appliance (VCSA) and ESXi hypervisors, to establish long-term persistence. By operating beneath the guest operating system, attackers exploit a significant visibility gap where traditional endpoint detection and response protections are entirely ineffective. A compromise of the vCenter control plane grants an attacker administrative control over every managed ESXi host and virtual machine, providing a direct path for data exfiltration of Tier-0 assets.

To help organizations mitigate these attack vectors and harden their infrastructure, we have outlined a multi-phase defense strategy:

  • Establish a Zero Trust network architecture by eliminating logical network paths from untrusted zones to the management zone. This requires micro-segmentation and strict ingress and egress filtering at both the hardware and host levels.
  • Prevent lateral movement and credential harvesting by restricting shell access for high-privilege accounts and mandating the use of Privileged Access Workstations for all administrative sessions.
  • Bridge the logging gap by transforming the VCSA into a proactive security sensor using auditd for kernel-level system call tracking and AIDE for cryptographic file integrity monitoring.

To directly support defenders, Mandiant has also released a vCenter hardening script and scanner tool. This tool changes default vCenter settings that are vulnerable to implement security configurations directly at the Photon Linux layer, enforcing a tamper-proof host-based firewall and a detailed audit trail.