Chinese hackers exploiting Dell zero-day flaw since mid-2024
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得仔细阅读文章内容,找出关键点。 文章主要讲的是一个疑似中国国家支持的黑客组织UNC6201利用戴尔RecoverPoint for Virtual Machines中的一个严重漏洞进行零日攻击。这个漏洞CVE-2026-22769是一个硬编码凭据漏洞,允许未认证的远程攻击者获取操作系统访问权限。此外,黑客还使用了名为Grimbolt的新恶意软件和隐藏网络接口技术来渗透目标网络。 接下来,我需要将这些信息浓缩到100字以内。要突出黑客组织、漏洞名称、影响以及使用的恶意软件和技术。同时,保持语言简洁明了。 可能的结构是:首先提到黑客组织和漏洞名称,然后说明漏洞的影响,接着提到使用的恶意软件和技术,最后指出目标通常是缺乏传统安全措施的设备。 现在开始组织语言:“疑似中国国家支持的黑客组织UNC6201利用戴尔RecoverPoint中的严重漏洞CVE-2026-22769进行零日攻击。该漏洞允许未认证攻击者获取操作系统访问权限。黑客使用Grimbolt恶意软件和隐藏网络接口技术渗透目标网络,主要针对缺乏传统安全措施的设备。” 检查一下字数是否在限制内,并确保所有关键点都被涵盖。 </think> 疑似中国国家支持的黑客组织UNC6201利用戴尔RecoverPoint中的严重漏洞CVE-2026-22769进行零日攻击。该漏洞允许未认证攻击者获取操作系统访问权限。黑客使用Grimbolt恶意软件和隐藏网络接口技术渗透目标网络,主要针对缺乏传统安全措施的设备。 2026-2-17 20:15:21 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

Dell

A suspected Chinese state-backed hacking group has been quietly exploiting a critical Dell security flaw in zero-day attacks that started in mid-2024.

Security researchers from Mandiant and the Google Threat Intelligence Group (GTIG) revealed today that the UNC6201 group exploited a maximum-severity hardcoded-credential vulnerability (tracked as CVE-2026-22769) in Dell RecoverPoint for Virtual Machines, a solution used for VMware virtual machine backup and recovery.

"Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability," Dell explains in a security advisory published on Tuesday.

Wiz

"This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgrade or apply one of the remediations as soon as possible."

Once inside a victim's network, UNC6201 deployed several malware payloads, including newly identified backdoor malware called Grimbolt. Written in C# and built using a relatively new compilation technique, this malware is designed to be faster and harder to analyze than its predecessor, a backdoor called Brickstorm.

While the researchers have observed the group swapping out Brickstorm for Grimbolt in September 2025, it remains unclear whether the switch was a planned upgrade or "a reaction to incident response efforts led by Mandiant and other industry partners."

Targeting VMware ESXi servers

The attackers also used novel techniques to burrow deeper into victims' virtualized infrastructure, including creating hidden network interfaces (so-called Ghost NICs) on VMware ESXi servers to move stealthily across victims' networks.

"UNC6201 uses temporary virtual network ports (AKA "Ghost NICs") to pivot from compromised VMs into internal or SaaS environments, a new technique that Mandiant has not observed before in their investigations," Mandiant communications manager Mark Karayan told BleepingComputer.

"Consistent with the earlier BRICKSTORM campaign, UNC6201 continues to target appliances that typically lack traditional endpoint detection and response (EDR) agents to remain undetected for long periods."

The researchers have found overlaps between UNC6201 and a separate Chinese threat cluster, UNC5221, known for exploiting Ivanti zero-days to target government agencies with custom Spawnant and Zipline malware and previously linked to the notorious Silk Typhoon Chinese state-backed threat group (although the two are not considered identical by GTIG).

GTIG added in September that UNC5221 hackers used Brickstorm (first documented by Google subsidiary Mandiant in April 2024) to gain long-term persistence on the networks of multiple U.S. organizations in the legal and technology sectors, while CrowdStrike has linked Brickstorm malware attacks targeting VMware vCenter servers of legal, technology, and manufacturing companies in the United States to a Chinese hacking group it tracks as Warp Panda.

To block ongoing CVE-2026-22769 attacks, Dell customers are advised to follow the remediation guidance shared in this security advisory.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/chinese-hackers-exploiting-dell-zero-day-flaw-since-mid-2024/
如有侵权请联系:admin#unsafe.sh