Hardening Your vSphere Environment Against BRICKSTORM Malware: A Step-by-Step Guide
Introduction
Recent research from Google Threat Intelligence Group (GTIG) has highlighted the BRICKSTORM malware campaign, which specifically targets VMware vSphere environments, including vCenter Server Appliance (VCSA) and ESXi hypervisors. Threat actors establish persistence at the virtualization layer, operating below the guest operating system where traditional security tools are ineffective. This guide provides a structured approach to hardening your vSphere infrastructure against such threats, focusing on identity controls, host configuration, and visibility enhancements. By following these steps, you can transform your virtualization layer into a robust defense against persistent threats like BRICKSTORM.

What You Need
- Administrative access to vCenter Server Appliance (VCSA) and ESXi hosts
- Familiarity with vSphere Web Client or CLI commands
- Network access to the vSphere environment from a secure management workstation
- Privileged Access Management (PAM) solution (recommended)
- Mandiant vCenter Hardening Script (optional but recommended)
- Log aggregation tool such as SIEM or syslog server
Step 1: Assess Your Current vSphere Security Posture
Before implementing changes, evaluate your environment's baseline security. Review the current configuration of vCenter Server Appliance and ESXi hosts against standard benchmarks (e.g., CIS Benchmarks for VMware). Identify gaps in identity management, such as shared accounts or weak passwords. Check whether logging is enabled and centralized. This assessment will prioritize the most critical hardening actions.
Step 2: Harden the vCenter Server Appliance (VCSA) Operating System
VCSA runs on Photon Linux and requires custom hardening beyond default settings. Follow these actions:
- Disable unnecessary services (e.g., SSH if not required for management).
- Apply the latest patches and security updates.
- Restrict network access using firewall rules; allow only trusted IP ranges.
- Configure auditd for system call monitoring.
- Set strong password policies for local accounts (root, vpxd, etc.).
These measures reduce the attack surface and limit lateral movement within the control plane.
Step 3: Implement Strict Identity and Access Controls
Threat actors often exploit weak identity design. Strengthen authentication and authorization:
- Integrate vCenter with an external identity provider (Active Directory, LDAP) for centralized management.
- Enforce multi-factor authentication (MFA) for all administrative accounts.
- Use role-based access control (RBAC) with least privilege; avoid assigning admin roles broadly.
- Eliminate default accounts and change default passwords.
By hardening identity, you prevent attackers from escalating privileges even if they gain initial access.
Step 4: Enable Comprehensive Monitoring and Logging
The visibility gap between the virtualization layer and traditional EDR tools is a key attack vector. Close it with:
- Configure vCenter Server Appliance to forward logs (syslog, audit logs) to a SIEM.
- Enable ESXi host logging (e.g., auth.log, shell history) and send to central collector.
- Monitor for unusual activities, such as unauthorized API calls or creation of new VMs.
- Set up alerts for modifications to vCenter roles, permissions, or local accounts.
Proactive monitoring allows early detection of BRICKSTORM-like persistence attempts.

Step 5: Harden ESXi Hosts and Virtual Machines
ESXi hosts are direct targets for malware that seeks to control guest VMs. Apply these hardening steps:
- Disable DCHP on management interfaces; use static IP assignments.
- Enable Secure Boot and Trusted Platform Module (TPM) features.
- Restrict access to the Direct Console User Interface (DCUI) and limit shell access.
- Apply the latest ESXi patches from VMware.
- Configure virtual machine-level protections, such as VM Encryption and TPM 2.0 for sensitive VMs.
These controls prevent attackers from compromising the hypervisor to manipulate guest operating systems.
Step 6: Deploy the Mandiant vCenter Hardening Script (Optional but Recommended)
Mandiant has released a dedicated hardening script for vCenter that automates many of the above configurations at the Photon Linux layer. After testing in a non-production environment, run the script on your VCSA. It enforces settings like SSH restriction, firewall rules, audit configuration, and password policies. This script accelerates deployment and ensures consistency across your environment.
Step 7: Regularly Audit and Review Security Configurations
Security is an ongoing process. Schedule periodic audits of your vSphere configuration against the initial baseline. Review logs for anomalies. Update rules as new threats emerge (e.g., BRICKSTORM variants). Involve your security operations team in tabletop exercises to test incident response for virtualization layer compromises.
Tips for Success
- Test changes in a lab environment before applying to production to avoid service disruptions.
- Document all configuration changes to maintain a clear audit trail.
- Stay informed about new vulnerabilities and patches from VMware and Google Threat Intelligence Group.
- Consider using a PAM solution to manage administrative credentials with session recording and just-in-time access.
By systematically hardening each layer of your vSphere infrastructure, you significantly reduce the risk of BRICKSTORM and similar malware. The combination of strong identity controls, comprehensive logging, and OS-level hardening transforms your virtualization layer into a fortified asset against advanced persistent threats.
Related Articles
- Attackers Hijack Amazon SES for High-Trust Phishing Campaigns: What Security Teams Must Know
- How to Shield Your Software Supply Chain from Watering Hole Attacks with AI-Powered EDR
- AI Breakthrough: Frontier Models Now Capable of Autonomous Zero-Day Discovery, Unit 42 Reports
- CVE-2023-33538: Command Injection Attacks Target TP-Link Routers with Mirai Botnet Payloads
- Oracle’s Monthly Patching Shift: 10 Key Facts to Counter AI Threats
- NHS England's Open-Source Software Withdrawal Sparks Debate on Security vs. Openness
- Cyber Automation Race: Attackers Use Machine Speed to Overwhelm Human Defenders
- Breaking: Cybersecurity Automation Imperative as Machine-Speed Attacks Overwhelm Human Defenses