Dec 4 (Reuters) – Chinese-linked hackers used sophisticated malware to penetrate and maintain long-term access to unnamed government and information technology entities, U.S. and Canadian cybersecurity agencies said on Thursday.
Sign up here.
Liu Pengyu, a spokesperson for the Chinese embassy in Washington, said in an email that the Chinese government does not “encourage, support or connive at cyber attacks,” and that “we reject the relevant parties’ irresponsible assertion” about the activities in question, when the parties had “neither put forward any request related to the issue nor presented any factual evidence.”
In one case, the attackers used Brickstorm to penetrate a company in April 2024 and maintained access through at least September 3, 2025, according to the advisory. CISA Executive Assistant Director for Cybersecurity Nick Andersen declined to share details about the total number of government organizations targeted or specifics around what the hackers did once they penetrated their targets during a call with reporters on Thursday.
A Broadcom spokesperson said in an email that the company was aware of reports of hackers using Brickstorm “after obtaining access to customer environments.” The company encourages all customers to apply up-to-date software patches and adhere to strong operational security, the spokesperson said.
In September, Google’s Threat Intelligence Group reported responding to Brickstorm-linked intrusions across a range of industries, including legal services, software service providers, business process outsourcers and technology.
In addition to traditional espionage, the hackers in those cases likely also used the operations to develop new, previously unknown vulnerabilities and establish pivot points to broader access to more victims, Google said at the time.
Reporting by AJ Vicens in Detroit; Editing by Matthew Lewis
Our Standards: The Thomson Reuters Trust Principles.
