Ep. 33 - BRICKSTORM Reemerges: CISA & NSA Warn of New Persistence Tactics and Cyber Resilience Gaps

07/12/2025 12 min Episodio 33
Ep. 33 - BRICKSTORM Reemerges: CISA & NSA Warn of New Persistence Tactics and Cyber Resilience Gaps

Listen "Ep. 33 - BRICKSTORM Reemerges: CISA & NSA Warn of New Persistence Tactics and Cyber Resilience Gaps"

Episode Synopsis

In Episode 33 of The Cyber Resilience Brief, hosts Tova Dvorin and Adrian Culley revisit the BRICKSTORM threat—this time through the lens of the new CISA, NSA, and Canadian Cyber Centre joint advisory. While Episode 24 explored BRICKSTORM’s origin, stealth techniques, and UNC5221’s long-term espionage campaign, this episode focuses on what’s changed, and why BRICKSTORM remains a critical concern for defenders in 2025 and into 2026.
Tova and Adrian break down the advisory’s latest findings, including expanded targeting of government and IT sectors, advanced persistence mechanisms, and new insights into how attackers leverage VMware environments to maintain full, covert control of compromised systems.
The conversation underscores a central message: these tactics aren’t static. BRICKSTORM is evolving, and organizations must evolve their defenses too. That means shifting from occasional checks to continuous validation, embracing Breach and Attack Simulation (BAS), and operationalizing threat exposure management to match the pace of modern threat actors.
What’s New in This Episode


Key updates from the CISA/NSA/CCCS advisory on BRICKSTORM


Evolving persistence and communication-hiding techniques


How attackers continue to exploit VMware and web-facing infrastructure


Why high-value organizations remain prime targets


The growing need for continuous, proactive security validation


How BAS helps validate Zero Trust and uncover blind spots before adversaries do


For more information on SafeBreach's BRICKSTORM coverage, click here to read our blog. 

More episodes of the podcast The Cyber Resilience Brief: A SafeBreach Podcast