china hackers exploit dell vulnerability

Chinese hackers have pounced on a critical vulnerability in Dell RecoverPoint, exploiting hardcoded credentials to gain root-level access to virtual machines. Security researchers at Mandiant identified UNC6201, a China-nexus threat actor, as the culprit behind these attacks that date back to mid-2024.

Guess what they found? A vulnerability so severe it earned a perfect CVSS score of 10.0. That’s as bad as it gets, folks.

The flaw, tracked as CVE-2026-22769, affects Dell RecoverPoint for Virtual Machines versions prior to 6.0.3.1 HF1. It’s a disaster waiting to happen. The attackers didn’t waste time. They used the admin credentials stored in tomcat-users.xml to deploy their Slaystyle web shell through Apache Tomcat Manager.

But they didn’t stop there. These hackers know what they’re doing. They’ve been switching up their toolkit, replacing their Brickstorm backdoor with a fancy new one called Grimbolt in September 2025. Grimbolt is particularly sophisticated as it’s written in C# and uses native AOT compilation techniques that make it harder for security teams to analyze. Classic upgrade move.

They achieved persistence by modifying the convert_hosts.sh script that runs at boot via rc.local. Smart, right?

The exploitation has been limited so far—less than a dozen organizations. But the impact? Massive. With root-level access, attackers can execute arbitrary code and pivot through networks like they own the place. They even created temporary “ghost NICs” on ESXi-hosted VMs for network pivoting. That’s some next-level stuff.

CISA already added this vulnerability to their Known Exploited Vulnerabilities Catalog. Dell rushed out a patch—upgrade to version 6.0.3.1 HF1 if you know what’s good for you.

The worst part? This isn’t just random hacking. UNC6201 specializes in targeting edge appliances like VPN concentrators. Investigators noted multiple web requests to the appliance prior to the actual compromise, showing the methodical reconnaissance approach these actors employ. They’re after persistent access for espionage, not quick hits.

And with backup infrastructure compromised, recovering from these attacks becomes a nightmare. Government and business entities, you’re in their crosshairs. Better check those systems. Now.

Leave a Reply
You May Also Like

Reactivated Cardano Wallet After Five Years Mysteriously Loses $6 Million in Ada-To-Usda Swap

A dormant Cardano wallet reactivated after five years lost over $6 million in a disastrous trading blunder. What went wrong in this shocking transaction?

Berachain Validators Halt Network for Emergency Hard Fork to Fix Balancer V2 Exploits — Bold Move?

Berachain’s bold move to halt its network raises eyebrows as it battles a $12 million exploit. Can the emergency hard fork restore security and user trust?

FBI Seizes RAMP Forum — A Stunning Blow to Russian Cybercrime

The FBI’s jaw-dropping takedown of RAMP Forum signals a seismic shift in the cybercrime realm. What happens now for the world of ransomware?

NiceHash 2025: Trustworthy or Risky for Your Crypto Mining?

Is NiceHash a savvy choice for crypto mining or a risky gamble? Explore the security concerns, profitability dynamics, and user experiences that could tip the scale.