BRICKSTORM Malware Exposes Critical VMware vSphere Security Gaps: Experts Urge Immediate Hardening
Attack Chain Highlights Virtualization Layer Vulnerabilities
Google Threat Intelligence Group (GTIG) has identified an escalating cyber threat dubbed BRICKSTORM that directly targets VMware's vSphere ecosystem, including the vCenter Server Appliance (VCSA) and ESXi hypervisors. Unlike typical malware, BRICKSTORM exploits weak security architecture and identity design rather than software vulnerabilities, allowing attackers to establish persistence at the virtualization layer.

According to Mandiant security researcher Stuart Carrera, “These intrusions rely on the effectiveness of exploiting weak security architecture and identity design, a lack of host-based configuration enforcement, and limited visibility within the virtualization layer.” Once inside, threat actors operate beneath guest operating systems, where traditional endpoint detection and response (EDR) agents cannot function.
This approach creates what experts call a “significant visibility gap”—the control planes of vCenter and ESXi have historically received less security focus than standard endpoints, leaving them vulnerable to long-term persistence and administrative takeover of the entire vSphere environment.
Background: The BRICKSTORM Threat
BRICKSTORM specifically targets the vCenter Server Appliance (VCSA), the central point of control for vSphere infrastructure. The VCSA runs on a specialized Photon Linux operating system and often hosts critical Tier-0 workloads, such as domain controllers and privileged access management (PAM) solutions.
Mandiant's analysis reveals that a compromise of the vCenter control plane grants an attacker administrative control over every managed ESXi host and virtual machine, effectively rendering traditional organizational tiering irrelevant. The threat is not due to product vulnerabilities, but to insufficient custom security configurations at both the vSphere and Photon Linux layers.
To address this, Mandiant has released a vCenter Hardening Script that enforces security configurations directly at the Photon Linux layer, helping organizations automate protection against BRICKSTORM-like threats.
Immediate Hardening Measures Recommended
Experts emphasize that out-of-the-box defaults are insufficient for securing the VCSA. Achieving a Tier-0 security standard requires intentional, custom security configurations at both the vSphere and underlying Photon Linux layers.

Mandiant's hardening script enforces security configurations directly at the operating system level. “By implementing these recommendations, organizations can transform the virtualization layer into a hardened environment capable of detecting and blocking persistent threats,” Carrera stated.
Key actions include enforcing strict RBAC policies, disabling unnecessary services, and implementing comprehensive logging and monitoring at the virtualization control plane.
What This Means for Organizations
The BRICKSTORM malware underscores a critical shift in attack strategies—threat actors are moving below the guest operating system to targets where traditional security tools are blind. For organizations relying on VMware vSphere, this means the entire virtualization layer must be treated as a high-value asset.
Security teams must now prioritize host-based configuration enforcement and visibility within the virtualization layer. Without these measures, attackers can establish long-term persistence and administrative control over the entire vSphere environment, potentially compromising every virtual machine and workload.
As Carrera concluded, “This activity is not the result of a security vulnerability in vendors' products or infrastructure. Instead, it’s a reminder that securing the control plane requires a committed, infrastructure-centric defense strategy.”