Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Dell RecoverPoint VMs Vulnerability Exploited Since 2024

Dell RecoverPoint VMs Vulnerability Exploited Since 2024

Posted on February 18, 2026 By CWS

A severe security flaw in Dell RecoverPoint for Virtual Machines has been actively exploited as a zero-day vulnerability since mid-2024. This was revealed in a report by Google Mandiant and Google Threat Intelligence Group, which attributes the attacks to a China-linked threat cluster identified as UNC6201.

Details of the Vulnerability

The flaw, tracked as CVE-2026-22769 with a CVSS score of 10.0, involves hard-coded credentials in versions before 6.0.3.1 HF1. It allows unauthorized access to the system, granting root-level persistence. Dell has confirmed that other products like RecoverPoint Classic are unaffected.

To mitigate the risk, Dell advises upgrading affected versions and recommends deploying RecoverPoint within a secure, internally controlled network environment. The vulnerability particularly targets versions 5.3 SP4 P1 through 6.0 SP3 P1, necessitating specific upgrade paths to version 6.0.3.1 HF1.

Exploitation Techniques

The attack exploits an “admin” user in the Apache Tomcat Manager, allowing the deployment of a web shell named SLAYSTYLE to execute commands as root. This leads to the installation of the BRICKSTORM backdoor and its successor, GRIMBOLT, which is harder to detect due to its advanced features.

GRIMBOLT enhances its stealth capabilities, making it difficult for traditional detection methods to identify the threat. The campaign primarily targets organizations in North America, focusing on systems lacking endpoint detection and response capabilities.

Broader Implications and Future Outlook

UNC6201 shows similarities with another espionage group, UNC5221, known for exploiting virtualization technologies. Despite these overlaps, they are considered separate entities. The group employs tactics like using “Ghost NICs” to hide their tracks and manipulate network interfaces.

The persistent threat underscores the challenges in securing systems against nation-state actors, who often target vulnerabilities before patches are available. Recent activities by groups like Volt Typhoon highlight the ongoing risks to critical infrastructure sectors, emphasizing the need for vigilant cybersecurity measures.

Organizations are urged to stay informed about potential threats and ensure their systems are updated with the latest patches to defend against such sophisticated cyber-attacks.

The Hacker News Tags:BRICKSTORM, China-nexus, Cybersecurity, Dell, GrimBolt, RecoverPoint, Security, UNC6201, Vulnerability, zero-day

Post navigation

Previous Post: Anthropic Unveils Enhanced Claude Sonnet 4.6 Model
Next Post: CISA Urges Action on Windows ActiveX RCE Flaw

Related Posts

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware The Hacker News
Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies The Hacker News
LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets The Hacker News
BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers The Hacker News
Your Digital Footprint Can Lead Right to Your Front Door Your Digital Footprint Can Lead Right to Your Front Door The Hacker News
Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fortinet Addresses Critical FortiClient EMS Vulnerability
  • 36 Malicious npm Packages Exploit Databases for Persistent Access
  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub
  • Fortinet Issues Patch for Critical FortiClient EMS Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fortinet Addresses Critical FortiClient EMS Vulnerability
  • 36 Malicious npm Packages Exploit Databases for Persistent Access
  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub
  • Fortinet Issues Patch for Critical FortiClient EMS Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark