china hackers exploit dell vulnerability

Chinese hackers have pounced on a critical vulnerability in Dell RecoverPoint, exploiting hardcoded credentials to gain root-level access to virtual machines. Security researchers at Mandiant identified UNC6201, a China-nexus threat actor, as the culprit behind these attacks that date back to mid-2024.

Guess what they found? A vulnerability so severe it earned a perfect CVSS score of 10.0. That’s as bad as it gets, folks.

The flaw, tracked as CVE-2026-22769, affects Dell RecoverPoint for Virtual Machines versions prior to 6.0.3.1 HF1. It’s a disaster waiting to happen. The attackers didn’t waste time. They used the admin credentials stored in tomcat-users.xml to deploy their Slaystyle web shell through Apache Tomcat Manager.

But they didn’t stop there. These hackers know what they’re doing. They’ve been switching up their toolkit, replacing their Brickstorm backdoor with a fancy new one called Grimbolt in September 2025. Grimbolt is particularly sophisticated as it’s written in C# and uses native AOT compilation techniques that make it harder for security teams to analyze. Classic upgrade move.

They achieved persistence by modifying the convert_hosts.sh script that runs at boot via rc.local. Smart, right?

The exploitation has been limited so far—less than a dozen organizations. But the impact? Massive. With root-level access, attackers can execute arbitrary code and pivot through networks like they own the place. They even created temporary “ghost NICs” on ESXi-hosted VMs for network pivoting. That’s some next-level stuff.

CISA already added this vulnerability to their Known Exploited Vulnerabilities Catalog. Dell rushed out a patch—upgrade to version 6.0.3.1 HF1 if you know what’s good for you.

The worst part? This isn’t just random hacking. UNC6201 specializes in targeting edge appliances like VPN concentrators. Investigators noted multiple web requests to the appliance prior to the actual compromise, showing the methodical reconnaissance approach these actors employ. They’re after persistent access for espionage, not quick hits.

And with backup infrastructure compromised, recovering from these attacks becomes a nightmare. Government and business entities, you’re in their crosshairs. Better check those systems. Now.

Leave a Reply
You May Also Like

Crypto Hacks Halved in 2025 — Data Exposes an Even Deadlier Financial Menace

Crypto hacks plummeted in 2025, yet losses soared to a staggering $2.17 billion. What’s the new threat lurking beneath the surface?

Fake Bird Calls Helped Thieves Steal $1.1b in Bitcoin — Malaysia Hunts Aerial Heat Signatures

A bizarre $1.1 billion Bitcoin heist in Malaysia used fake bird calls to evade detection. What innovative tactics did cybercriminals employ to pull it off?

Why Your MetaMask Suddenly Showed $0 on Ethereum During the AWS Outage

When MetaMask users saw zero balances, panic spread. Was it a hack or a glitch? The truth reveals unsettling truths about crypto’s reliance on centralized systems.

Inside the Truebit Exploit: Hacker Launders $26M in ETH Through Tornado Cash

A $26M heist shook the crypto world as a hacker exploited a flaw and laundered ETH through Tornado Cash. What does this mean for the future?