Dell 0-Day Vulnerability Exploited by Chinese Hackers since mid-2024 to Deploy Malware

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

Dell 0-Day Vulnerability

A critical zero-day exploitation campaign targeting Dell RecoverPoint for Virtual Machines. The vulnerability, tracked as CVE-2026-22769, carries a maximum CVSSv3.1 score of 10.0 and has been under active exploitation since at least mid-2024.

Incident response engagements attribute this activity to UNC6201, a suspected PRC-nexus threat cluster that shares notable overlaps with the group publicly known as Silk Typhoon (UNC5221).

Mandiant and the Google Threat Intelligence Group (GTIG) observed that the attackers have utilized this flaw to move laterally across networks, maintain persistent access, and deploy a suite of sophisticated malware, including SLAYSTYLE, BRICKSTORM, and a novel backdoor identified as GRIMBOLT.

While the initial access vector remains unconfirmed, UNC6201 is known for targeting edge appliances like VPN concentrators to establish its foothold.

Hardcoded Default Admin Credentials

The vulnerability stems from a critical oversight in the configuration of the Apache Tomcat Manager within Dell RecoverPoint appliances. Security researchers discovered that the software contained hardcoded default credentials for the admin user, located in the /home/kos/tomcat9/tomcat-users.xml file.

This configuration flaw allows unauthenticated remote attackers to log into the Tomcat Manager, a component used for deploying software updates and management tasks. Once authenticated, threat actors can abuse the /manager/text/deploy endpoint to upload malicious WAR files.

In observed attacks, this mechanism was used to deploy the SLAYSTYLE web shell, granting the attackers root-level command execution capabilities on the compromised appliance.

A significant development in this campaign is the threat actor’s transition from the BRICKSTORM backdoor to a new malware family dubbed GRIMBOLT.

Observed in September 2025, this shift represents a maturation in tradecraft designed to evade detection and optimize performance on resource-constrained edge devices. Unlike traditional .NET malware that relies on Just-In-Time (JIT) compilation, GRIMBOLT is written in C# and compiled using Native Ahead-of-Time (AOT) compilation.

This method converts the code directly into machine-native code during the build process, removing Common Intermediate Language (CIL) metadata that security tools typically scan. The malware is further packed with UPX to complicate static analysis, reads the Mandiant report.

To maintain persistence, UNC6201 modifies the legitimate convert_hosts.sh script, ensuring the backdoor executes automatically at system boot via rc.local.

Beyond malware deployment, UNC6201 has demonstrated advanced networking tactics to navigate compromised environments stealthily. Mandiant analysts observed the creation of “Ghost NICs,” temporary network ports configured on existing virtual machines within ESXi servers.

These hidden interfaces allow the attackers to pivot silently between internal networks and Software-as-a-Service (SaaS) infrastructure without alerting standard network monitoring tools.

Furthermore, the attackers employ a stealthy traffic management technique known as Single Packet Authorization (SPA) using iptables. Forensic analysis of Systemd Journals revealed that the attackers monitor incoming traffic on port 443 for a specific hexadecimal string.

When this magic packet is detected, the source IP address is added to an allowlist. Subsequent connections from that IP to port 10443 are then accepted, while traffic from non-approved IPs is silently redirected.

This technique effectively hides the command and control (C2) channel from casual observation and automated scanning.

Vulnerability Details

CVE ID CVSS Score Description
CVE-2026-22769 10.0 (Critical) A hardcoded credential vulnerability in Dell RecoverPoint for Virtual Machines allows unauthenticated remote attackers to access the underlying OS and establish root-level persistence.

Affected Versions

Dell has released urgent mitigation guidance for affected customers. The following versions require immediate attention:

Product Affected Versions Remediation Action
RecoverPoint for Virtual Machines 5.3 SP4 P1 Migrate to 6.0 SP3, then upgrade to 6.0.3.1 HF1 OR apply remediation script DSA-2026-079.
RecoverPoint for Virtual Machines 6.0 through 6.0 SP3 P1 Upgrade to 6.0.3.1 HF1 OR apply remediation script DSA-2026-079.
RecoverPoint for Virtual Machines 5.3 SP4 and earlier Upgrade to 5.3 SP4 P1 or a 6.x version, then apply the remediation script.

Indicators of Compromise (IOCs)

The following file and network indicators have been associated with this campaign.

Indicator Value Type Malware Family File Name / Context
24a11a26a2586f4fba7bfe89df2e21a0809ad85069e442da98c37c4add369a0c SHA256 GRIMBOLT support
dfb37247d12351ef9708cb6631ce2d7017897503657c6b882a711c0da8a9a591 SHA256 GRIMBOLT out_elf_2
92fb4ad6dee9362d0596fda7bbcfe1ba353f812ea801d1870e37bfc6376e624a SHA256 SLAYSTYLE default_jsp.java
aa688682d44f0c6b0ed7f30b981a609100107f2d414a3a6e5808671b112d1878 SHA256 BRICKSTORM N/A
2388ed7aee0b6b392778e8f9e98871c06499f476c9e7eae6ca0916f827fe65df SHA256 BRICKSTORM splisten
320a0b5d4900697e125cebb5ff03dee7368f8f087db1c1570b0b62f5a986d759 SHA256 BRICKSTORM N/A
90b760ed1d0dcb3ef0f2b6d6195c9d852bcb65eca293578982a8c4b64f51b035 SHA256 BRICKSTORM N/A
45313a6745803a7f57ff35f5397fdf117eaec008a76417e6e2ac8a6280f7d830 SHA256 BRICKSTORM N/A
wss://149.248.11.71/rest/apisession C2 Endpoint GRIMBOLT N/A
149.248.11.71 C2 IP GRIMBOLT N/A

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.