Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Dell RecoverPoint Exploited by Chinese Hackers

Dell RecoverPoint Exploited by Chinese Hackers

Posted on February 18, 2026 By CWS

A critical security flaw in Dell’s RecoverPoint for Virtual Machines has been actively exploited by a cyberespionage group with ties to China, according to a joint report from Google’s Threat Intelligence Group (GTIG) and Mandiant. The vulnerability, identified as CVE-2026-22769, has been targeted since at least mid-2024 and poses significant risks to data protection and disaster recovery solutions.

Details of the Exploitation

GTIG and Mandiant have linked the exploitation of this vulnerability to a threat actor known as UNC6201. This group has utilized the flaw to facilitate lateral movement, establish persistence, and deploy malware within compromised systems. Dell’s RecoverPoint for Virtual Machines, an integral part of the company’s data protection suite, is designed to provide resilience and disaster recovery for VMware virtual machines.

Dell has issued an advisory addressing CVE-2026-22769, describing it as a hardcoded credential vulnerability affecting RecoverPoint versions prior to 6.0.3.1 HF1. Users are urged to update to the latest version to mitigate the risk of unauthorized access and root-level persistence by remote attackers.

Emergence of UNC6201 and Their Tools

This marks the first public identification of UNC6201, although Google notes its connections to another China-linked advanced persistent threat (APT) group, UNC5221. The latter is notorious for its prolonged network intrusions aimed at gathering sensitive information. Previously, UNC5221 employed the BrickStorm malware, which has been reportedly replaced by a new malware variant called GrimBolt in September 2025.

GrimBolt is a sophisticated backdoor, developed in C# and utilizing native ahead-of-time compilation and UPX packing to hinder analysis. This malware grants attackers remote shell access, further complicating detection and remediation efforts.

Technical Insights and Industry Response

Both GrimBolt and its predecessor, BrickStorm, have been deployed on systems running Dell’s RecoverPoint. Although the initial access point remains unconfirmed, edge appliances are suspected to be a potential vector. Additionally, attackers have used a web shell named SlayStyle in these operations.

In an effort to evade detection, UNC6201 has employed tactics such as creating and later removing ‘ghost NICs’ on virtual machines. This stealthy approach complicates forensic investigations and prolongs the dwell time of intrusions. Mandiant’s CTO, Charles Carmakal, highlighted the challenges faced by organizations lacking endpoint detection and response (EDR) capabilities, which can lead to extended exposure to such threats.

GTIG and Mandiant have released indicators of compromise (IoCs) to aid cybersecurity professionals in identifying and mitigating these attacks. This development underscores the ongoing need for vigilance and advanced security measures in the face of evolving cyber threats.

Security Week News Tags:Chinese hackers, CVE-2026-22769, Cybersecurity, Dell, GrimBolt, GTIG, Mandiant, RecoverPoint, UNC6201, zero-day

Post navigation

Previous Post: CISA Highlights Four Actively Exploited Security Vulnerabilities
Next Post: CRESCENTHARVEST Malware Targets Iran Protesters

Related Posts

Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability Security Week News
Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication Security Week News
Filigran Raises  Million in Series C Funding Filigran Raises $58 Million in Series C Funding Security Week News
ShadowV2 DDoS Service Lets Customers Self-Manage Attacks ShadowV2 DDoS Service Lets Customers Self-Manage Attacks Security Week News
DanaBot Botnet Disrupted, 16 Suspects Charged DanaBot Botnet Disrupted, 16 Suspects Charged Security Week News
Fuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking Fuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Phishing Scam Targets Booking.com Users in Fraud Scheme
  • CISA Alerts on Exploited Vulnerability in TeamT5 Product
  • Critical Flaw in Popular VS Code Extension Exposes Developers
  • Notepad++ Secures Update Process Against Malware Threat
  • CISA Alerts on Active Exploitation of Google Chromium Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Phishing Scam Targets Booking.com Users in Fraud Scheme
  • CISA Alerts on Exploited Vulnerability in TeamT5 Product
  • Critical Flaw in Popular VS Code Extension Exposes Developers
  • Notepad++ Secures Update Process Against Malware Threat
  • CISA Alerts on Active Exploitation of Google Chromium Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News