Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Dell RecoverPoint VMs Vulnerability Exploited Since 2024

Dell RecoverPoint VMs Vulnerability Exploited Since 2024

Posted on February 18, 2026 By CWS

A severe security flaw in Dell RecoverPoint for Virtual Machines has been actively exploited as a zero-day vulnerability since mid-2024. This was revealed in a report by Google Mandiant and Google Threat Intelligence Group, which attributes the attacks to a China-linked threat cluster identified as UNC6201.

Details of the Vulnerability

The flaw, tracked as CVE-2026-22769 with a CVSS score of 10.0, involves hard-coded credentials in versions before 6.0.3.1 HF1. It allows unauthorized access to the system, granting root-level persistence. Dell has confirmed that other products like RecoverPoint Classic are unaffected.

To mitigate the risk, Dell advises upgrading affected versions and recommends deploying RecoverPoint within a secure, internally controlled network environment. The vulnerability particularly targets versions 5.3 SP4 P1 through 6.0 SP3 P1, necessitating specific upgrade paths to version 6.0.3.1 HF1.

Exploitation Techniques

The attack exploits an “admin” user in the Apache Tomcat Manager, allowing the deployment of a web shell named SLAYSTYLE to execute commands as root. This leads to the installation of the BRICKSTORM backdoor and its successor, GRIMBOLT, which is harder to detect due to its advanced features.

GRIMBOLT enhances its stealth capabilities, making it difficult for traditional detection methods to identify the threat. The campaign primarily targets organizations in North America, focusing on systems lacking endpoint detection and response capabilities.

Broader Implications and Future Outlook

UNC6201 shows similarities with another espionage group, UNC5221, known for exploiting virtualization technologies. Despite these overlaps, they are considered separate entities. The group employs tactics like using “Ghost NICs” to hide their tracks and manipulate network interfaces.

The persistent threat underscores the challenges in securing systems against nation-state actors, who often target vulnerabilities before patches are available. Recent activities by groups like Volt Typhoon highlight the ongoing risks to critical infrastructure sectors, emphasizing the need for vigilant cybersecurity measures.

Organizations are urged to stay informed about potential threats and ensure their systems are updated with the latest patches to defend against such sophisticated cyber-attacks.

The Hacker News Tags:BRICKSTORM, China-nexus, Cybersecurity, Dell, GrimBolt, RecoverPoint, Security, UNC6201, Vulnerability, zero-day

Post navigation

Previous Post: Anthropic Unveils Enhanced Claude Sonnet 4.6 Model
Next Post: CISA Urges Action on Windows ActiveX RCE Flaw

Related Posts

New Advanced Linux VoidLink Malware Targets Cloud and container Environments New Advanced Linux VoidLink Malware Targets Cloud and container Environments The Hacker News
Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses The Hacker News
Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms The Hacker News
Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites The Hacker News
Digital Parasite Threats Redefine Cybersecurity in 2026 Digital Parasite Threats Redefine Cybersecurity in 2026 The Hacker News
Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Navigating Cybersecurity Amidst Constant Instability
  • Critical Zero-Day Flaws in PDF Software Risk Data Exposure
  • Critical Vulnerabilities in PDF Platforms Addressed by Foxit and Apryse
  • Security Risks in Popular VS Code Extensions Identified
  • CISA Urges Action on Windows ActiveX RCE Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Navigating Cybersecurity Amidst Constant Instability
  • Critical Zero-Day Flaws in PDF Software Risk Data Exposure
  • Critical Vulnerabilities in PDF Platforms Addressed by Foxit and Apryse
  • Security Risks in Popular VS Code Extensions Identified
  • CISA Urges Action on Windows ActiveX RCE Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News