CrowdStrike tracked a China-nexus adversary dubbed WARP PANDA conducting persistent, stealthy intrusions against VMware vCenter and ESXi environments across U.S. legal, technology, and manufacturing organizations, deploying BRICKSTORM, JSP web shells, and two new Golang implants named Junction and GuestConduit. The actor exploited internet-facing edge device and vCenter vulnerabilities, tunneled traffic and exfiltrated staged data (including Microsoft 365 and SharePoint content), and maintained long-term access likely for PRC-aligned intelligence collection. #WARP_PANDA #BRICKSTORM
Keypoints
- WARP PANDA targeted VMware vCenter and ESXi environments at U.S.-based legal, technology, and manufacturing entities, maintaining long-term persistent access across multiple intrusions.
- The adversary deployed BRICKSTORM (Golang backdoor), JSP web shells, and two new implants for ESXi/guest VMs called Junction and GuestConduit.
- Initial access commonly involved exploiting internet-facing edge devices (Ivanti, F5) or vCenter vulnerabilities and using valid credentials, including the privileged vpxuser account.
- WARP PANDA used OPSEC-focused tradecraftâlog clearing, timestomping, creating unregistered malicious VMs, tunneling via vCenter/ESXi/guest VMs, and masquerading implants as legitimate VMware services.
- Data collection and exfiltration included cloning/domain-controller VM access, staging data from ESXi snapshots with 7âZip, and accessing Microsoft 365, OneDrive, SharePoint, and Exchange via session replay and API enumeration.
- Command-and-control infrastructure leveraged WebSockets over TLS, DNS-over-HTTPS, nested TLS channels, and public cloud services (Cloudflare Workers, Heroku) for C2 hosting.
- CrowdStrike recommends monitoring for unregistered VMs, restricting ESXi/vCenter outbound access, disabling unnecessary SSH/shell access (vpxuser), applying patches, enforcing MFA/federation, and deploying EDR on guest VMs.
MITRE Techniques
- [T1583.001 ] Acquire Infrastructure: Domains â WARP PANDA uses Cloudflare DNS services to register C2 domains (âWARP PANDA uses Cloudflare DNS services to register C2 domainsâ)
- [T1583.003 ] Acquire Infrastructure: Virtual Private Server â WARP PANDA uses VPS hosting providers (âWARP PANDA uses VPS hosting providersâ)
- [T1583.007 ] Acquire Infrastructure: Serverless â BRICKSTORM uses infrastructure hosted behind Cloudflare and has used Cloudflare Workers and Heroku for C2 communications (âBRICKSTORM uses infrastructure hosted behind Cloudflare and has used Cloudflare Workers and Heroku for C2 communicationsâ)
- [T1584.008 ] Compromise Infrastructure: Network Devices â WARP PANDA targets internet-facing edge devices (âWARP PANDA targets internet-facing edge devicesâ)
- [T1588.001 ] Obtain Capabilities: Malware â WARP PANDA has access to BRICKSTORM, Junction, and GuestConduit (âWARP PANDA has access to BRICKSTORM, Junction, and GuestConduitâ)
- [T1608.003 ] Stage Capabilities: Install Digital Certificate â WARP PANDA uses TLS certificates on C2 infrastructure (âWARP PANDA uses TLS certificates on C2 infrastructureâ)
- [T1078.004 ] Valid Accounts: Cloud Accounts â WARP PANDA has gained access to Microsoft Azure environments, specifically targeting Office365 resources (âWARP PANDA has gained access to Microsoft Azure environments, specifically targeting Office365 resourcesâ)
- [T1190 ] Exploit Public-Facing Application â WARP PANDA has exploited vulnerabilities in internet-facing edge devices to gain initial network access (âWARP PANDA has exploited vulnerabilities in internet-facing edge devices to gain initial network accessâ)
- [T1078.001 ] Valid Accounts: Default Accounts â WARP PANDA has leveraged the legitimate vpxuser account for privileged access to vCenter servers (âWARP PANDA has leveraged the legitimate vpxuser account for privileged access to vCenter serversâ)
- [T1098.001 ] Account Manipulation: Additional Cloud Credentials â WARP PANDA has registered a new MFA device using an Authenticator app code (âWARP PANDA has registered a new MFA device using an Authenticator app codeâ)
- [T1505.003 ] Server Software Component: Web Shell â WARP PANDA has used web shells to maintain persistence (âWARP PANDA has used web shells to maintain persistenceâ)
- [T1036.004 ] Masquerading: Masquerade Task or Service â BRICKSTORM and Junction masquerade as legitimate VMware processes and services (âBRICKSTORM and Junction masquerade as legitimate VMware processes and servicesâ)
- [T1070.004 ] Indicator Removal: File Deletion â WARP PANDA has deleted files to avoid detection (âWARP PANDA has deleted files to avoid detectionâ)
- [T1070.006 ] Indicator Removal: Timestomp â WARP PANDA has modified file timestamps to avoid detection and blend in with legitimate files (âWARP PANDA has modified file timestamps to avoid detection and blend in with legitimate filesâ)
- [T1564.006 ] Hide Artifacts: Run Virtual Instance â WARP PANDA has created malicious VMs within the VMware environment (âWARP PANDA has created malicious VMs within the VMware environmentâ)
- [T1083 ] File and Directory Discovery â Junction allows a connected client to browse and download files from the host machine (âJunction allows a connected client to browse and download files from the host machineâ)
- [T1021.004 ] Remote Services: SSH â WARP PANDA has used SSH to move between vCenter servers and ESXi hosts (âWARP PANDA has used SSH to move between vCenter servers and ESXi hostsâ)
- [T1550.001 ] Use Alternate Authentication Material: Application Access Token â WARP PANDA has moved laterally between different cloud services within the Azure environment (âWARP PANDA has moved laterally between different cloud services within the Azure environmentâ)
- [T1114.002 ] Email Collection: Remote Email Collection â WARP PANDA has gained access to mailboxes (âWARP PANDA has gained access to mailboxesâ)
- [T1213 ] Data from Information Repositories â WARP PANDA has gained access to sensitive files (âWARP PANDA has gained access to sensitive filesâ)
- [T1213.002 ] Data from Information Repositories: SharePoint â WARP PANDA has used BRICKSTORM to access and download sensitive SharePoint files (âWARP PANDA has used BRICKSTORM to access and download sensitive SharePoint filesâ)
- [T1530 ] Data from Cloud Storage â WARP PANDA has accessed cloud environments to collect sensitive information (âWARP PANDA has accessed cloud environments to collect sensitive informationâ)
- [T1560.001 ] Archive Collected Data: Archive via Utility â WARP PANDA has used 7-Zip to compress data before exfiltration (âWARP PANDA has used 7-Zip to compress data before exfiltrationâ)
- [T1071.001 ] Application Layer Protocol: Web Protocols â BRICKSTORM uses WebSockets to communicate with C2 infrastructure over TLS (âBRICKSTORM uses WebSockets to communicate with C2 infrastructure over TLSâ)
- [T1071.004 ] Application Layer Protocol: DNS â BRICKSTORM uses DNS-over-HTTPS to resolve C2 domains (âBRICKSTORM uses DNS-over-HTTPS to resolve C2 domainsâ)
- [T1090 ] Proxy â Junction allows a connected client to start a TCP or UDP proxy; GuestConduit allows traffic proxying from a host hypervisor to a different endpoint address (âJunction allows a connected client to start a TCP or UDP proxy; GuestConduit allows traffic proxying from a host hypervisor to a different endpoint addressâ)
- [T1090.003 ] Proxy: Multi-hop Proxy â WARP PANDA has used commercial VPN services (âWARP PANDA has used commercial VPN servicesâ)
- [T1095 ] Non-Application Layer Protocol â Junction and GuestConduit can both communicate using VSOCK network connections (âJunction and GuestConduit can both communicate using VSOCK network connectionsâ)
- [T1572 ] Protocol Tunneling â Junction can forward network traffic over a VSOCK connection to a listening virtual machine (VM) (âJunction can forward network traffic over a VSOCK connection to a listening virtual machine (VM)â)
- [T1573.002 ] Encrypted Channel: Asymmetric Cryptography â BRICKSTORM can communicate with C2 infrastructure via TLS (âBRICKSTORM can communicate with C2 infrastructure via TLSâ)
- [T1041 ] Exfiltration Over C2 Channel â WARP PANDA has exfiltrated archived data to C2 infrastructure (âWARP PANDA has exfiltrated archived data to C2 infrastructureâ)
Indicators of Compromise
- [SHA256 Hash ] Malware and implant samples â 40db68331cb52dd3ffa0698144d1e6919779ff432e2e80c058e41f7b93cec042 (GuestConduit), 40992f53effc60f5e7edea632c48736ded9a2ca59fb4924eb6af0a078b74d557 (BRICKSTORM), and 2 more hashes
- [IP Address ] Infrastructure used by actor â 208.83.233.14, 149.28.120.31
- [Process/Executable Names ] Masquerade indicators on vCenter/ESXi â updatemgr, vami-http (BRICKSTORM impersonation of legitimate vCenter processes)
- [Ports ] Service/listener indicators â port 8090 (Junction listening, also used by vvold), port 5555 (GuestConduit VSOCK listener)
- [Account Names ] Credential/use-of-account indicators â vpxuser (privileged vCenter-managed account observed in SSH activity)
- [File Types / Artifacts ] Persistence and web shell indicators â JSP web shells deployed on vCenter servers
Read more: https://www.crowdstrike.com/en-us/blog/warp-panda-cloud-threats/