KNOW YOUR ENEMY | APT PROFILE
Active Threat10 min read

UNC5221 BRICKSTORM: China's APT Hides 393 Days Inside Law Firms and SaaS Providers

393 days
Average dwell time before detection — Mandiant Consulting incident response data
0 IOCs reused
Unique C2 infrastructure per victim — atomic indicator hunting fails by design
10+
BRICKSTORM variants analyzed across Go and Rust builds with active development confirmed
4 sectors
Primary targets: legal services, SaaS providers, business process outsourcers, technology

UNC5221, a suspected China-nexus advanced persistent threat group, has maintained undetected access inside U.S. legal firms, SaaS providers, business process outsourcers, and technology companies for an average of **393 days** using BRICKSTORM, a custom Go and Rust backdoor that conceals command-and-control traffic inside DNS-over-HTTPS queries routed through Google's and Cloudflare's public DNS resolvers.

**UNC5221 BRICKSTORM** is a long-duration espionage operation targeting organizations whose data carries geopolitical value. Mandiant Consulting, which has responded to multiple intrusions since March 2025, documented the 393-day average dwell time across confirmed victim organizations. The group deploys BRICKSTORM on network appliances and VMware vCenter servers — platforms that typically have no endpoint detection and response coverage — and then moves laterally into Active Directory, email systems, code repositories, and credential vaults to steal legally sensitive documents, source code, and cryptographic secrets. CISA updated its Malware Analysis Report for BRICKSTORM on February 11, 2026, adding three new samples including the first confirmed Rust-based variants, confirming that UNC5221 is actively developing the backdoor.

The mechanism is purpose-built for invisibility. BRICKSTORM resolves its C2 address using DNS-over-HTTPS, making malicious DNS queries cryptographically indistinguishable from normal web traffic. Every victim receives a unique C2 endpoint — a Cloudflare Workers subdomain or Heroku application — so no two BRICKSTORM deployments share a network indicator. When Mandiant investigators began active incident response on compromised networks, UNC5221 operators detected the IR activity and deployed new BRICKSTORM instances within hours to maintain persistent access.

Any organization running VMware vSphere, Ivanti, or other perimeter appliances without behavioral monitoring of outbound DNS and HTTPS traffic is currently at risk of an intrusion that will not trigger any existing signature-based detection.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts — distilled for practitioners. 50,000+ subscribers. No noise.

Who Is UNC5221?

**UNC5221** is a suspected China-nexus threat cluster tracked by Mandiant (Google) under the "UNC" (unclassified) designation, which indicates assessed but not publicly confirmed state sponsorship. The group shares tactical overlap with Silk Typhoon — the China state-sponsored actor attributed to the 2021 Microsoft Exchange Server exploitation campaign — though Mandiant does not currently classify UNC5221 and Silk Typhoon as the same cluster. Other vendor designations for overlapping activity include Bauxite (Dragos, when activity targets operational technology), and Hydro Kitten in older reporting.

The group's motivation is intelligence collection, not financial gain. UNC5221 does not deploy ransomware, extort victims, or conduct disruptive operations. Its interest in legal services firms centers on attorney-client privileged communications, litigation strategies, and documentation related to U.S. national security and international trade disputes — intelligence that holds significant geopolitical value for a state sponsor. SaaS provider targeting enables downstream access: compromising one SaaS vendor provides UNC5221 with a persistent foothold in dozens of the vendor's enterprise customers simultaneously.

Since at least March 2025, UNC5221 has demonstrated real-time awareness of incident response activity on compromised networks. Mandiant has observed operators deploying new BRICKSTORM variants within hours of investigators beginning active hunting — a capability consistent with continuous monitoring of victim environments and a professionally managed intelligence program. For context on how another China-nexus group conceals C2 traffic through legitimate cloud services, see the [GopherWhisper China APT campaign analysis](/blog/gopherwhisper-china-apt-slack-discord-outlook-c2).

By the time most incident response engagements begin, the initial access vector is outside any available log retention window. We are frequently reconstructing entry based on what the actor did, not how they got in.

Mandiant Consulting — BRICKSTORM incident response report, 2025

How Does BRICKSTORM Work?

**BRICKSTORM** is a cross-platform backdoor written in Go (and as of February 2026, also in Rust), compiled as an ELF binary targeting Linux and BSD-based network appliances, with Windows variants observed when attackers pivot off compromised perimeter devices. The backdoor provides three core capabilities: SOCKS5 proxy tunneling for internal network traversal, DNS-over-HTTPS C2 resolution to hide communications, and file system browsing via Windows UNC paths.

Command-and-control uses no static domain or IP. BRICKSTORM resolves its C2 address by querying a DNS-over-HTTPS endpoint — using Google Public DNS (8.8.8.8), Cloudflare (1.1.1.1), Quad9, or any of eight alternative DoH resolvers — to look up an IP encoded inside a hostname on sslip.io or nip.io. Both services resolve a hostname directly to the IP address embedded in it, so the actual C2 IP address never appears in plaintext DNS traffic. All resolution traffic is encrypted HTTPS, making it visually identical to normal browsing traffic and transparent to DNS inspection tools.

Once connected, BRICKSTORM opens a SOCKS5 proxy tunnel that UNC5221 operators use to browse internal systems as though sitting on the corporate network — accessing internal web interfaces, code repositories, credential vaults, and Windows file shares, all through the BRICKSTORM channel with no additional tooling visible on the host. The new Rust-based variants documented in the February 2026 CISA update introduce Garble obfuscation, stripping Go compiler metadata and replacing function and variable names with random strings to defeat static analysis. A delay-timer variant has also been observed: it contains a hard-coded future timestamp and does not begin C2 beaconing until that date passes, bypassing sandboxes that run samples for only minutes before concluding no malicious behavior was observed.

How Does the UNC5221 Attack Chain Work?

UNC5221 operates a disciplined, seven-stage intrusion chain that consistently begins on perimeter appliances and ends with long-duration persistent access across an organization's entire digital environment. Each stage maps to documented MITRE ATT&CK techniques, though the 393-day average dwell time frequently means only post-exploitation stages are visible to defenders at the time of discovery.

1

Initial Access — T1190: Exploit Public-Facing Application

UNC5221 exploits zero-day and N-day vulnerabilities in internet-facing network appliances. Ivanti VPN appliances are the most frequently documented initial vector. Post-exploitation anti-forensics scripts run immediately to widen the log retention gap before any detection is possible.

2

Establish Foothold — T1505.003 Web Shell + T1547.006 Init Script

BRICKSTORM is deployed to the compromised appliance. Persistence is written to init.d, rc.local, or systemd using sed commands. The SLAYSTYLE JSP web shell is installed on vCenter Apache Tomcat to provide a secondary access path independent of BRICKSTORM.

3

Credential Access — T1556 Modify Auth + T1555 Password Stores

The BRICKSTEAL Java servlet filter intercepts HTTP requests to vCenter's SAML SSO endpoint, capturing Active Directory credentials in cleartext. UNC5221 also targets Delinea Secret Server and extracts credentials stored in PowerShell scripts on compromised hosts.

4

Lateral Movement — T1021.004 SSH + T1550.002 Alt Auth Material

Using stolen credentials, operators SSH into vCenter servers and activate VAMI SSH access. They access the vCenter web UI with captured AD credentials, gaining control of the entire virtualization infrastructure from a single stolen credential set.

5

Privilege Escalation — VM Cloning Attack (T1059.004)

Operators clone sensitive Windows Server VMs, including Domain Controllers, while they are powered off. The filesystem of the cloned VM is mounted to extract ntds.dit, the Active Directory database. Security tools do not execute on powered-off VMs, so the extraction is undetected by EDR.

6

Collection — T1114.002 Email Collection + T1213 Data Repositories

UNC5221 registers M365 Enterprise Applications scoped with mail.read or full_access_as_app permissions, enabling access to any mailbox without triggering conditional access policies. Targeted individuals' emails are bulk-downloaded through the BRICKSTORM SOCKS tunnel.

7

Exfiltration — T1041 Exfil Over C2 + T1090.001 Proxy

All data travels over the BRICKSTORM SOCKS5 proxy to operator-controlled infrastructure, with traffic exiting through commercial VPN providers such as PIA, NordVPN, and Surfshark, or a purpose-built SOHO router obfuscation network. Rotating exit nodes defeat geolocation-based blocking.

Which Sectors Does UNC5221 Target Right Now?

Mandiant Consulting's incident response data confirms four primary target sectors for UNC5221 operations since March 2025. **Legal services** firms represent the highest-priority target class: UNC5221 specifically seeks attorney-client communications, merger and acquisition due diligence documentation, and litigation files related to U.S. national security and international trade disputes. The value of this data to a state intelligence program is direct — the legal sector processes the most sensitive business-government communications outside classified government systems.

**SaaS providers** are targeted for supply chain access. A single SaaS provider compromise delivers persistent access to dozens of enterprise customers through trusted identity provider relationships, allowing UNC5221 to move laterally from the vendor environment into downstream organizations without exploiting them directly. **Business process outsourcers** are targeted for similar reasons: BPOs maintain administrative access to client environments that serve as lateral movement bridges.

**Technology companies** are targeted for intellectual property. UNC5221's interest in tech firms centers on zero-day research, source code for widely deployed products, and cryptographic key material. Mandiant assessed that stolen vulnerability research could enable UNC5221 to develop its own zero-day exploits for future campaigns — a self-reinforcing capability loop that makes technology sector victims of particular long-term concern.

Geographic focus is the United States. No confirmed European, Asian, or other geographic victims have been attributed to UNC5221 in open source reporting as of May 2026, though absence of attribution does not indicate absence of activity.

BRICKSTORM Infrastructure and Indicators of Compromise

UNC5221 deliberately avoids reusing infrastructure across victims. Each BRICKSTORM deployment receives a unique C2 endpoint — a Cloudflare Workers subdomain or Heroku application — and unique binary samples, making atomic indicator hunting ineffective as the primary defensive control. The indicators below represent confirmed samples from public reporting; assume no two live deployments share these characteristics.

BRICKSTORM uses DNS-over-HTTPS resolvers as C2 resolution infrastructure, querying DoH endpoints at Google Public DNS (8.8.8.8, 8.8.4.4), Cloudflare (1.1.1.1, 1.0.0.1), Quad9 (9.9.9.9, 149.112.112.112), and alternates. It resolves C2 addresses via sslip.io or nip.io hostname encoding. Any outbound traffic from appliances to Cloudflare Workers hostnames or Heroku application domains that is not initiated by a known administrative action should be treated as a high-confidence BRICKSTORM indicator.

The SLAYSTYLE web shell targeting vCenter's Apache Tomcat component and the BRICKSTEAL Java servlet filter targeting the /web/saml2/sso/* URI are the two most reliable forensic indicators of UNC5221 on vCenter infrastructure. Both are detectable via YARA rules published in the CISA Malware Analysis Report AR25-338A (updated February 11, 2026). The Mandiant BRICKSTORM scanner, available on GitHub, runs against live appliance filesystems without requiring YARA installation. For context on how APT actors use zero-click techniques to move into network infrastructure, see the [APT28 Windows Shell zero-click analysis](/blog/cve-2026-32202-windows-shell-apt28-ntlmv2-zero-click).

Subscribe to unlock Indicators of Compromise

Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.

Detecting UNC5221 Activity: Your Hunting Guide

Standard signature-based detection fails against UNC5221 by design — no shared IOCs across victims, EDR-free appliance targeting, in-memory persistence, and DoH C2 obfuscation all defeat conventional controls simultaneously. Detection requires behavioral hunting across four data sources: vSphere audit logs, Microsoft 365 Unified Audit Log, DNS and firewall telemetry, and Windows User Access Logging. Mandiant's published nine-priority hunting checklist is the authoritative reference; the six highest-yield hunts for most organizations are listed below.

Subscribe to unlock Remediation & Mitigation steps

Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.

Why UNC5221 BRICKSTORM Matters for Your Organization

UNC5221 BRICKSTORM represents the highest-sophistication persistent access threat to U.S. organizations in sectors that hold intelligence value for a state sponsor. Three factors make this group categorically different from the financially motivated ransomware actors that dominate most threat briefings.

First, BRICKSTORM operates exclusively in the EDR blind spot. Network appliances, VPN concentrators, and VMware hypervisors are the entry and persistence layer — environments where behavioral monitoring agents are rarely deployed. By the time an attacker with a financial motive would have triggered a ransomware alert, UNC5221 has already been inside the environment for months harvesting data silently.

Second, the 393-day average dwell time means historical logs do not cover the initial breach. Most organizations retain firewall and access logs for 30 to 90 days. A breach that began 13 months ago is forensically invisible using conventional log analysis. Response planning must accept that initial access reconstruction is unlikely and focus on current-state containment and forward-looking monitoring rather than root cause analysis.

Third, the supply chain dimension amplifies risk beyond direct victims. If your SaaS provider, legal counsel, or outsourced business process vendor is a UNC5221 target, that relationship creates a lateral movement path into your environment without you being directly targeted. Third-party access risk assessments should explicitly include BRICKSTORM scanning and vSphere hardening posture as evaluation criteria.

Subscribe to unlock Remediation & Mitigation steps

Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.

The bottom line

UNC5221 BRICKSTORM backdoor is the most patient APT persistent access threat operating against U.S. organizations right now. Three takeaways: BRICKSTORM lives on EDR-blind appliances and hypervisors where most security stacks have zero visibility; DNS-over-HTTPS C2 concealment means standard DNS monitoring misses active beaconing entirely; and the 393-day average dwell time guarantees historical logs predate the initial breach. Before this week ends, enable VMware vSphere lockdown mode, forward VPXD logs to your SIEM with extended retention, and run the Mandiant BRICKSTORM scanner on every internet-facing appliance you operate.

Frequently asked questions

Who is UNC5221?

UNC5221 is a suspected China-nexus advanced persistent threat group tracked by Mandiant (Google). The UNC designation indicates assessed but not formally confirmed state sponsorship. The group shares tactical overlap with Silk Typhoon, the actor behind the 2021 Microsoft Exchange Server exploitation, though Mandiant treats them as potentially distinct clusters. UNC5221 is also tracked as Bauxite by Dragos when its activity targets operational technology environments. The group's motivation is espionage — it seeks legally sensitive documents, source code, cryptographic material, and email communications from organizations with national security or trade significance to a Chinese state sponsor.

What is BRICKSTORM malware?

BRICKSTORM is a custom backdoor attributed to UNC5221, written in Go and as of February 2026 also in Rust. It is compiled as an ELF binary and deployed on Linux or BSD-based network appliances and VMware vCenter servers. BRICKSTORM provides SOCKS5 proxy tunneling for internal network traversal, DNS-over-HTTPS C2 resolution to conceal communications, and file system browsing via Windows UNC paths. CISA published the initial Malware Analysis Report AR25-338A in December 2025 and updated it on February 11, 2026 with three new samples including the first Rust-based variants, confirming active ongoing development.

What TTPs does UNC5221 use?

UNC5221 uses a seven-stage attack chain mapped to MITRE ATT&CK. Initial access exploits zero-day vulnerabilities in internet-facing appliances (T1190). Persistence uses init.d and systemd modification (T1547.006) and JSP web shells on vCenter (T1505.003). Credential access intercepts vCenter SSO authentication (T1556) and extracts credentials from password vaults (T1555). Lateral movement uses SSH with stolen credentials (T1021.004) and VM cloning attacks to extract ntds.dit. Data collection targets M365 mailboxes via Enterprise Applications (T1114.002). All exfiltration travels over the BRICKSTORM SOCKS proxy (T1041) through commercial VPN providers.

Which sectors does UNC5221 target?

Mandiant confirms four primary target sectors: legal services firms for attorney-client privileged communications on national security and trade disputes; SaaS providers for downstream customer access via identity provider trust relationships; business process outsourcers for administrative access to client environments; and technology companies for source code, zero-day research, and cryptographic material. All confirmed victims as of May 2026 are U.S.-based organizations. The 393-day average dwell time means intrusions identified today likely began in early 2025 or earlier.

How do I detect BRICKSTORM on VMware vCenter?

Six detection methods apply to vCenter specifically. Run the Mandiant BRICKSTORM scanner from GitHub against all appliance filesystems and look for binaries named pg_update, spclisten, or vmp using CISA YARA rules from AR25-338A. Alert on HTTP PUT requests to /rest/appliance/access/ssh in VAMI logs — UNC5221 enables SSH this way. Search vSphere VPXD logs for VM clone events followed by destroy within the same session on Domain Controller or SSO VMs. Check Apache Tomcat directories for SLAYSTYLE JSP web shells. Enumerate Entra ID for Enterprise Applications scoped with mail.read permissions. Alert on DoH traffic from appliance management IPs to Cloudflare Workers or Heroku destinations.

Has UNC5221 been indicted or sanctioned?

No public indictments or sanctions specifically targeting UNC5221 operators have been issued as of May 2026. The group is tracked under multiple vendor designations rather than a government-attributed name. By contrast, the related Silk Typhoon cluster was publicly attributed by the U.S. government in connection with the 2021 Microsoft Exchange exploitation. The absence of indictment reflects ongoing operational sensitivity and the challenges of attribution at this level, not any ambiguity about China-nexus state sponsorship assessed by Mandiant and CISA.

How does UNC5221 stay undetected for 393 days?

UNC5221 achieves 393-day average dwell time through four deliberate evasion strategies. BRICKSTORM is deployed on network appliances and VMware hypervisors where EDR agents are not installed. DNS-over-HTTPS C2 makes resolution traffic cryptographically identical to normal HTTPS browsing. No IOCs are shared across victims — each deployment uses unique binaries and unique C2 endpoints — so threat intelligence feeds carry no relevant indicators. Delay-timer variants of BRICKSTORM contain a hard-coded future timestamp and do not begin beaconing until that date is reached, bypassing sandboxes that run samples for only minutes.

What is the difference between UNC5221 and Silk Typhoon?

Both UNC5221 and Silk Typhoon are China-nexus espionage groups with overlapping TTPs, but Mandiant does not currently classify them as the same cluster. Silk Typhoon was formally attributed by the U.S. government for the 2021 zero-day exploitation of Microsoft Exchange Server. UNC5221 is assessed as a related but potentially distinct cluster based on differences in tooling and victim selection, with VMware vCenter and network appliance exploitation as its documented entry method rather than Exchange Server. In practice, apply hardening guidance for both: Exchange and Microsoft infrastructure for Silk Typhoon, VMware and perimeter appliance hardening plus BRICKSTORM scanning for UNC5221.

Sources & references

  1. Mandiant / Google Cloud — Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
  2. CISA — Malware Analysis Report: BRICKSTORM Backdoor (AR25-338A, updated Feb 11, 2026)
  3. Picus Security — BRICKSTORM Malware: UNC5221 Targets Tech and Legal Sectors in the United States
  4. ExtraHop — The BRICKSTORM Campaign: UNC5221
  5. MITRE ATT&CK — Techniques Library

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Get tomorrow's threat briefing before your inbox does.