A China-Linked Malware Group Is Targeting Software Suppliers

Google's Mandiant team found the malware BRICKSTORM on Linux and BSD-based appliances from multiple manufacturers.

Key takeaways

  • Google detected a long-term malware operation by the China-linked UNC5221 group.
  • The group’s malware stayed undetected in victims’ systems for an average of 393 days.
  • Stronger authentication protocols might help companies avoid similar attacks in the future.

Another major hacking campaign has been uncovered. Google just revealed a hacker group with links to China has been using stealth malware to steal data from US firms, frequently remaining undetected for more than a year.

The targeted companies included those in the SaaS industry, as well as the legal and business outsourcing sectors. Victims suffered from intellectual property theft in addition to unwanted infrastructure access.

The group, called UNC5221, is known for these types of long-term cyberattacks.

How UNC5221’s Malware Got Access

According to the announcement from the Google-owned Mandiant Incident Response team, the threat actors exploited zero-day vulnerabilities to gain intial access in at least one case.

The primary backdoor was BRICKSTORM, a malware that the Mandiant team found “on Linux and BSD-based appliances from multiple manufacturers.”

 

About Tech.co Video Thumbnail Showing Lead Writer Conor Cawley Smiling Next to Tech.co LogoThis just in! View
the top business tech deals for 2025 👨‍💻
See the list button

Since these appliances are “often poorly inventoried, not monitored by security teams, and excluded from centralized security logging solutions,” malware can more easily avoid detection. Once deployed, BRICKSTORM pivoted to VMware systems in multiple cases, an area that UNC5221 tends to target.

The malware, on average, lasted 393 days before detection.

In Danger: SaaS Companies and Outsourcers

Mandiant also noted which types of companies were targeted, a list that includes software suppliers and outsourcing companies.

“Since March 2025, Mandiant Consulting has responded to intrusions across a range of industry verticals, most notably legal services, Software as a Service (SaaS) providers, Business Process Outsourcers (BPOs), and Technology. The value of these targets extends beyond typical espionage missions, potentially providing data to feed development of zero-days and establishing pivot points for broader access to downstream victims.” -Mandiant Incident Response

One common theme was the group’s interest in collecting the emails of “key individuals” at the companies, using Microsoft Entra ID Enterprise Applications in order to gain access to mail across any company inbox.

Staying Safe From Cyberattacks

How can your own company stay safe down the road? Stronger protocols like multi-factor authentication can go a long way towards helping.

Google also recommends adopting a TTP-based hunting approach, the term for a proactive security technique that analyzes analyzes the most common TTP — that’s Tactics, Techniques, and Procedures — that hackers are currently using.

According to Mandiant, this is “not only an ideal practice, but a necessity to detect patterns of attack that are unlikely to be detected by traditional signature-based defenses.”

Without it, your company might one day wind up finding out UNC5221’s malware has been embedded in its systems for months already.

Did you find this article helpful? Click on one of the following buttons
We're so happy you liked! Get more delivered to your inbox just like it.

We're sorry this article didn't help you today – we welcome feedback, so if there's any way you feel we could improve our content, please email us at contact@tech.co

Written by:
Adam has been a writer at Tech.co for nine years, covering fleet management and logistics. He has also worked at the logistics newletter Inside Lane, and has worked as a tech writer, blogger and copy editor for more than a decade. He was a Forbes Contributor on the publishing industry, for which he was named a Digital Book World 2018 award finalist. His work has appeared in publications including Popular Mechanics and IDG Connect, and his art history book on 1970s sci-fi, 'Worlds Beyond Time,' was a 2024 Locus Awards finalist. When not working on his next art collection, he's tracking the latest news on VPNs, POS systems, and the future of tech.
Explore More See all news
Back to top
close Thinking about your online privacy? NordVPN is Tech.co's top-rated VPN service See Deals