top of page

APT Exploits Dell RecoverPoint Zero-Day Since 2024

  • 22 hours ago
  • 2 min read

Key Findings


  • A suspected China-linked APT group, UNC6201, has been exploiting a critical zero-day vulnerability in Dell RecoverPoint for Virtual Machines since mid-2024.

  • The vulnerability, tracked as CVE-2026-22769, has a CVSS score of 10.0 and involves hardcoded credentials that can be abused to gain unauthorized access and root-level persistence.

  • The group has used the flaw to move laterally, maintain persistence, and deploy malware including SLAYSTYLE, BRICKSTORM, and a novel C# backdoor named GRIMBOLT.

  • Mandiant and Google's Threat Intelligence Group (GTIG) have reported on this activity, providing details on the group's tactics, techniques, and procedures (TTPs).


Background


  • Dell RecoverPoint for Virtual Machines is a data protection and disaster recovery solution for VMware environments.

  • The vulnerable versions of the software include 5.3 SP4 and earlier, as well as 6.0, 6.0 SP1, 6.0 SP2, and 6.0 SP3 prior to 6.0.3.1 HF1.

  • Dell has released patches and mitigation guidance to address the vulnerability.


Exploitation and Malware Deployment


  • The attackers exploited the hardcoded credential vulnerability to gain access to the Dell RecoverPoint Tomcat Manager.

  • They then uploaded a malicious WAR file containing the SLAYSTYLE web shell, allowing them to execute commands as root on the appliance.

  • The group used the SLAYSTYLE web shell to deploy the BRICKSTORM backdoor and its newer variant, GRIMBOLT, a C# backdoor compiled using native ahead-of-time (AOT) compilation.

  • GRIMBOLT provides remote shell access and reuses the same command-and-control channels as BRICKSTORM.


Lateral Movement and Persistence


  • The attackers leveraged "Ghost NICs" (temporary virtual network interfaces) to pivot from compromised virtual machines into internal or SaaS environments.

  • They also used iptables-based Single Packet Authorization to covertly redirect and control traffic on vCenter appliances.

  • To ensure persistence, the group modified a legitimate startup script to run the backdoor automatically at boot.


Impact and Recommendations


  • The exploitation of this zero-day vulnerability has allowed the suspected China-linked group to gain access to and compromise VMware backup systems.

  • Dell strongly recommends that customers upgrade to the patched versions or apply the necessary mitigations as soon as possible to address this critical vulnerability.

  • Organizations should also review their security posture, implement robust endpoint detection and response (EDR) solutions, and closely monitor their VMware environments for any signs of compromise.


Sources


  • https://securityaffairs.com/188176/apt/china-linked-apt-weaponized-dell-recoverpoint-zero-day-since-2024.html

  • https://thehackernews.com/2026/02/dell-recoverpoint-for-vms-zero-day-cve.html

  • https://x.com/securityaffairs/status/2024095660094431393

  • https://www.securityweek.com/dell-recoverpoint-zero-day-exploited-by-chinese-cyberespionage-group/

  • https://www.instagram.com/p/DU6bg6oEjVS/

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page