Cybersecurity

Securing VMware vSphere Against BRICKSTORM: A Step-by-Step Hardening Guide

2026-05-05 09:54:29

Introduction

Recent research from Google Threat Intelligence Group (GTIG) has unveiled a sophisticated campaign named BRICKSTORM that directly targets virtualized environments, specifically the VMware vSphere ecosystem. Attackers achieve persistence at the virtualization layer, operating below the guest OS where traditional security tools like EDR are ineffective. This guide provides a structured approach to hardening your vCenter Server Appliance (VCSA) and ESXi hosts against such threats. By following these steps, you can transform your virtualization layer into a fortified, monitored environment.

Securing VMware vSphere Against BRICKSTORM: A Step-by-Step Hardening Guide
Source: www.mandiant.com

What You Need

Step-by-Step Hardening Guide

Step 1: Understand the BRICKSTORM Attack Chain

Review the attack flow documented by GTIG: attackers exploit weak identity designs, lack of configuration enforcement, and limited visibility in the virtualization layer. They compromise VCSA first (often via stolen credentials or weak authentication), then pivot to ESXi hosts, and ultimately gain administrative control over all VMs. Recognizing this pattern helps prioritize defenses.

Step 2: Assess Current vSphere Security Posture

Perform an inventory of your vSphere environment:

Step 3: Harden the vCenter Server Appliance (OS Layer)

The VCSA runs on a Photon Linux OS. Default configurations are insufficient for Tier-0 workloads. Use the following measures:

Step 4: Implement Strong Identity and Access Controls

Attackers often exploit weak authentication. Mitigate by:

Step 5: Enable Comprehensive Logging and Monitoring

The virtualization layer lacks standard endpoint agents. Therefore, enable at a minimum:

Securing VMware vSphere Against BRICKSTORM: A Step-by-Step Hardening Guide
Source: www.mandiant.com

Step 6: Harden ESXi Hosts

ESXi is the final target after VCSA compromise. Harden each host:

Step 7: Regularly Audit and Update Configurations

Hardening is an ongoing process. Schedule periodic reviews:

Using the Mandiant vCenter Hardening Script

The script enforces configurations at the Photon Linux layer, such as disabling unused services, hardening SSH, and enabling logging. Download it from Mandiant's GitHub. Follow the script's documentation for execution. Always test in a non-production environment first.

Tips for Success

Explore

Japan's Motorcycle Titans Accelerate Electric Shift: Factories and Portfolios Signal Major Transformation Deep-Sea Hideout: How Squid Outlasted Mass Extinctions Revealed in New Genomic Study Git 2.54: A Simpler Way to Rewrite History with `git history` 10 Major Linux Updates You Can't Miss This Month How Cloudflare Optimizes Its Global Network for Large Language Models