Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Dell RecoverPoint VMs Vulnerability Exploited Since 2024

Dell RecoverPoint VMs Vulnerability Exploited Since 2024

Posted on February 18, 2026 By CWS

A severe security flaw in Dell RecoverPoint for Virtual Machines has been actively exploited as a zero-day vulnerability since mid-2024. This was revealed in a report by Google Mandiant and Google Threat Intelligence Group, which attributes the attacks to a China-linked threat cluster identified as UNC6201.

Details of the Vulnerability

The flaw, tracked as CVE-2026-22769 with a CVSS score of 10.0, involves hard-coded credentials in versions before 6.0.3.1 HF1. It allows unauthorized access to the system, granting root-level persistence. Dell has confirmed that other products like RecoverPoint Classic are unaffected.

To mitigate the risk, Dell advises upgrading affected versions and recommends deploying RecoverPoint within a secure, internally controlled network environment. The vulnerability particularly targets versions 5.3 SP4 P1 through 6.0 SP3 P1, necessitating specific upgrade paths to version 6.0.3.1 HF1.

Exploitation Techniques

The attack exploits an “admin” user in the Apache Tomcat Manager, allowing the deployment of a web shell named SLAYSTYLE to execute commands as root. This leads to the installation of the BRICKSTORM backdoor and its successor, GRIMBOLT, which is harder to detect due to its advanced features.

GRIMBOLT enhances its stealth capabilities, making it difficult for traditional detection methods to identify the threat. The campaign primarily targets organizations in North America, focusing on systems lacking endpoint detection and response capabilities.

Broader Implications and Future Outlook

UNC6201 shows similarities with another espionage group, UNC5221, known for exploiting virtualization technologies. Despite these overlaps, they are considered separate entities. The group employs tactics like using “Ghost NICs” to hide their tracks and manipulate network interfaces.

The persistent threat underscores the challenges in securing systems against nation-state actors, who often target vulnerabilities before patches are available. Recent activities by groups like Volt Typhoon highlight the ongoing risks to critical infrastructure sectors, emphasizing the need for vigilant cybersecurity measures.

Organizations are urged to stay informed about potential threats and ensure their systems are updated with the latest patches to defend against such sophisticated cyber-attacks.

The Hacker News Tags:BRICKSTORM, China-nexus, Cybersecurity, Dell, GrimBolt, RecoverPoint, Security, UNC6201, Vulnerability, zero-day

Post navigation

Previous Post: Anthropic Unveils Enhanced Claude Sonnet 4.6 Model
Next Post: CISA Urges Action on Windows ActiveX RCE Flaw

Related Posts

Chrome Extensions Turn Malicious, Sparking Security Concerns Chrome Extensions Turn Malicious, Sparking Security Concerns The Hacker News
The Hidden Risk of Orphan Accounts The Hidden Risk of Orphan Accounts The Hacker News
How to Stop Python Supply Chain Attacks—and the Expert Tools You Need How to Stop Python Supply Chain Attacks—and the Expert Tools You Need The Hacker News
FBI and Europol Dismantle Cybercrime Forum LeakBase FBI and Europol Dismantle Cybercrime Forum LeakBase The Hacker News
Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors The Hacker News
Dangerous npm Package Steals macOS Credentials Dangerous npm Package Steals macOS Credentials The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub
  • Fortinet Issues Patch for Critical FortiClient EMS Vulnerability
  • Progress ShareFile Flaws Risk Server Takeover
  • European Commission Data Breach from Trivy Attack Unveiled

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub
  • Fortinet Issues Patch for Critical FortiClient EMS Vulnerability
  • Progress ShareFile Flaws Risk Server Takeover
  • European Commission Data Breach from Trivy Attack Unveiled

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark