Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Dell RecoverPoint VMs Vulnerability Exploited Since 2024

Dell RecoverPoint VMs Vulnerability Exploited Since 2024

Posted on February 18, 2026 By CWS

A severe security flaw in Dell RecoverPoint for Virtual Machines has been actively exploited as a zero-day vulnerability since mid-2024. This was revealed in a report by Google Mandiant and Google Threat Intelligence Group, which attributes the attacks to a China-linked threat cluster identified as UNC6201.

Details of the Vulnerability

The flaw, tracked as CVE-2026-22769 with a CVSS score of 10.0, involves hard-coded credentials in versions before 6.0.3.1 HF1. It allows unauthorized access to the system, granting root-level persistence. Dell has confirmed that other products like RecoverPoint Classic are unaffected.

To mitigate the risk, Dell advises upgrading affected versions and recommends deploying RecoverPoint within a secure, internally controlled network environment. The vulnerability particularly targets versions 5.3 SP4 P1 through 6.0 SP3 P1, necessitating specific upgrade paths to version 6.0.3.1 HF1.

Exploitation Techniques

The attack exploits an “admin” user in the Apache Tomcat Manager, allowing the deployment of a web shell named SLAYSTYLE to execute commands as root. This leads to the installation of the BRICKSTORM backdoor and its successor, GRIMBOLT, which is harder to detect due to its advanced features.

GRIMBOLT enhances its stealth capabilities, making it difficult for traditional detection methods to identify the threat. The campaign primarily targets organizations in North America, focusing on systems lacking endpoint detection and response capabilities.

Broader Implications and Future Outlook

UNC6201 shows similarities with another espionage group, UNC5221, known for exploiting virtualization technologies. Despite these overlaps, they are considered separate entities. The group employs tactics like using “Ghost NICs” to hide their tracks and manipulate network interfaces.

The persistent threat underscores the challenges in securing systems against nation-state actors, who often target vulnerabilities before patches are available. Recent activities by groups like Volt Typhoon highlight the ongoing risks to critical infrastructure sectors, emphasizing the need for vigilant cybersecurity measures.

Organizations are urged to stay informed about potential threats and ensure their systems are updated with the latest patches to defend against such sophisticated cyber-attacks.

The Hacker News Tags:BRICKSTORM, China-nexus, Cybersecurity, Dell, GrimBolt, RecoverPoint, Security, UNC6201, Vulnerability, zero-day

Post navigation

Previous Post: Anthropic Unveils Enhanced Claude Sonnet 4.6 Model
Next Post: CISA Urges Action on Windows ActiveX RCE Flaw

Related Posts

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists The Hacker News
Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks The Hacker News
Qilin and Warlock Ransomware Exploit Driver Vulnerabilities Qilin and Warlock Ransomware Exploit Driver Vulnerabilities The Hacker News
Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more The Hacker News
Google Halts Major Cyber Espionage Campaign Targeting 53 Entities Google Halts Major Cyber Espionage Campaign Targeting 53 Entities The Hacker News
North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Boosts Cyber Threats in App Security Landscape
  • Is Your Business Prepared for Agent AI Challenges?
  • Microsoft Python SDK Compromised by TeamPCP Hackers
  • 1Password and OpenAI Enhance Security for AI Coding Tools
  • Webworm Uses Discord and MS Graph for New Backdoors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Boosts Cyber Threats in App Security Landscape
  • Is Your Business Prepared for Agent AI Challenges?
  • Microsoft Python SDK Compromised by TeamPCP Hackers
  • 1Password and OpenAI Enhance Security for AI Coding Tools
  • Webworm Uses Discord and MS Graph for New Backdoors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark