Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Dell RecoverPoint Zero-Day Exploited by Chinese APT Since
Dell RecoverPoint Zero-Day Exploited by Chinese APT Since

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-22769

Dell RecoverPoint Zero-Day Exploited by Chinese APT Since

A maximum-severity CVSS 10.0 hardcoded credentials vulnerability in Dell RecoverPoint for VMs has been under active exploitation by China-nexus threat...

Dylan H.

Security Team

February 18, 2026
3 min read

Affected Products

  • Dell RecoverPoint for VMs before 6.0.3.1 HF1

Maximum Severity: CVSS 10.0

Google's Threat Intelligence Group has disclosed that a maximum-severity vulnerability in Dell RecoverPoint for Virtual Machines has been under active exploitation by a suspected China-nexus threat cluster since mid-2024 — nearly two years before the patch was released.

The flaw, tracked as CVE-2026-22769, is a hardcoded credentials vulnerability that ships with a default Apache Tomcat administrator password, allowing unauthenticated attackers to gain full administrative access.


Vulnerability Details

AttributeValue
CVECVE-2026-22769
CVSS Score10.0 (Critical)
TypeHardcoded Credentials (CWE-798)
Attack VectorNetwork — No authentication required
AffectedDell RecoverPoint for VMs < 6.0.3.1 HF1
FixVersion 6.0.3.1 HF1
Discovered ByGoogle Threat Intelligence Group

Attack Chain

The threat cluster UNC6201 used a sophisticated multi-stage attack chain:

1. Scan for internet-exposed Dell RecoverPoint instances
2. Authenticate using hardcoded Tomcat admin credentials
3. Upload SLAYSTYLE web shell via Tomcat manager
4. Deploy BRICKSTORM backdoor for persistent C2 access
5. Upgrade to GRIMBOLT backdoor (C#, native AOT, UPX-packed)
6. Create "Ghost NICs" — temporary virtual network interfaces
7. Pivot into internal networks and SaaS environments
8. Delete Ghost NICs to erase forensic traces
9. Exfiltrate data via encrypted channels

Malware Arsenal

MalwareTypeDescription
SLAYSTYLEWeb ShellInitial access persistence via Tomcat
BRICKSTORMBackdoorFirst-stage command-and-control implant
GRIMBOLTBackdoorEvolved C2, compiled with .NET Native AOT, packed with UPX for AV evasion

Novel "Ghost NIC" Technique

UNC6201 pioneered a technique dubbed "Ghost NICs" — creating temporary virtual network interfaces on compromised RecoverPoint appliances to pivot into internal and SaaS environments, then deleting the interfaces to erase evidence of lateral movement. This technique leaves minimal forensic artifacts and can bypass network monitoring tools that rely on persistent interface tracking.


Threat Actor: UNC6201

AttributeDetails
DesignationUNC6201
NexusChina
Active SinceMid-2024 (minimum)
Known VictimsFewer than 12 organizations in North America
ObjectiveLong-term espionage and data exfiltration

Google noted that while fewer than a dozen impacted organizations have been identified, the true scale of compromise is unknown — many organizations may not yet realize they are affected.


Immediate Actions

  1. Patch immediately — Update to Dell RecoverPoint for VMs version 6.0.3.1 HF1
  2. Restrict network access to RecoverPoint management interfaces
  3. Audit Tomcat logs for unauthorized admin sessions dating back to mid-2024
  4. Search for IOCs — SLAYSTYLE, BRICKSTORM, and GRIMBOLT artifacts
  5. Monitor for Ghost NIC creation — unusual virtual network interface creation and deletion events
  6. Engage incident response if any indicators are found

A CVSS 10.0 vulnerability exploited for nearly two years before disclosure is a worst-case scenario for any enterprise product. Organizations running Dell RecoverPoint should treat this as an immediate priority.

Sources

  • Google Cloud Blog — UNC6201 Exploiting Dell RecoverPoint Zero-Day
  • The Hacker News — Dell RecoverPoint CVE-2026-22769
  • SecurityWeek — Dell RecoverPoint Zero-Day Exploited by Chinese Cyberespionage Group
  • BleepingComputer — Chinese Hackers Exploiting Dell Zero-Day Since Mid-2024

Related Reading

  • UNC3886 Zero-Day Campaign: Singapore Telecom Operators
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to
  • Leaked Documents Reveal China
#Dell#Zero-Day#CVE-2026-22769#China#APT#UNC6201#BRICKSTORM#Espionage

Related Articles

UNC3886 Zero-Day Campaign: Singapore Telecom Operators

Singapore discloses that APT group UNC3886 conducted a targeted espionage campaign against M1, SIMBA, Singtel, and StarHub using a previously unknown...

5 min read

China-Linked Hackers Exploit VMware ESXi Zero-Days to

Sophisticated attack chain leverages compromised SonicWall VPN and VMware ESXi vulnerabilities to break out of virtual machine isolation and compromise...

4 min read

Apple Patches Actively Exploited Zero-Day in dyld

Apple releases emergency patches across all platforms for a memory corruption vulnerability in the Dynamic Link Editor (dyld) that was exploited in...

4 min read
Back to all Security Alerts