China-linked APT weaponized Dell RecoverPoint zero-day since 2024
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是一个与中国有关的APT组织利用Dell RecoverPoint的一个零日漏洞进行攻击。这个漏洞编号是CVE-2026-22769,CVSS评分10.0,非常严重。攻击从2024年中开始,持续到至少2025年。 攻击者利用这个漏洞获取了VMware备份系统的访问权限,并部署了多种恶意软件,如SLAYSTYLE、BRICKSTORM和GRIMBOLT。他们还使用了一些高级战术,比如“Ghost NICs”和iptables的单包授权来隐蔽行动。 Dell已经发布了补丁和缓解措施,Google也提供了IOC和Yara规则。 现在我需要把这些信息浓缩到100字以内。重点包括:中国关联的APT组织、零日漏洞CVE-2026-22769、攻击时间、利用漏洞进行横向移动和部署恶意软件、Dell的补丁以及Google的IOC。 可能的结构是:中国关联的APT组织利用Dell RecoverPoint零日漏洞CVE-2026-22769进行攻击,自2024年中以来部署恶意软件并横向移动。Dell已发布补丁,Google提供IOC。 这样大约在100字左右。 </think> 中国关联的APT组织利用Dell RecoverPoint零日漏洞CVE-2026-22769进行攻击,自2024年中以来部署恶意软件并横向移动。Dell已发布补丁,Google提供IOC。 2026-2-18 12:15:46 Author: securityaffairs.com(查看原文) 阅读量:2 收藏

China-linked APT weaponized Dell RecoverPoint zero-day since 2024

Pierluigi Paganini February 18, 2026

A suspected Chinese state-linked group exploited a critical Dell RecoverPoint flaw (CVE-2026-22769) in zero-day attacks starting mid-2024.

Mandiant and Google’s Threat Intelligence Group (GTIG) reported that a suspected China-linked APT group quietly exploited a critical zero-day flaw in Dell RecoverPoint for Virtual Machines starting in mid-2024.

“Mandiant and Google Threat Intelligence Group (GTIG) have identified the zero-day exploitation of a high-risk vulnerability in Dell RecoverPoint for Virtual Machines, tracked as CVE-2026-22769, with a CVSSv3.1 score of 10.0.” reads the report published by Google. “Analysis of incident response engagements revealed that UNC6201, a suspected PRC-nexus threat cluster, has exploited this flaw since at least mid-2024 to move laterally, maintain persistent access, and deploy malware including SLAYSTYLEBRICKSTORM, and a novel backdoor tracked as GRIMBOLT.”

The vulnerability, tracked as CVE-2026-22769, involves hardcoded credentials and was abused to gain access to VMware backup systems.

“Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgrade or apply one of the remediations as soon as possible.” reads the advisory published by Dell.”Dell has received a report from Google/Mandiant of limited active exploitation of this vulnerability. Dell strongly recommends that customers apply one of the remediations below to address this vulnerability as soon as possible.”

The China-nexus group exploited the bug to move laterally, maintain persistence, and deploy malware such as SLAYSTYLE, BRICKSTORM, and a new C# backdoor, GRIMBOLT. Researchers observed advanced tactics, including stealthy VMware pivoting via “Ghost NICs” and Single Packet Authorization with iptables. Dell has released patches and mitigation guidance.

During investigations into compromised Dell RecoverPoint appliances, Mandiant researchers discovered that attackers replaced BRICKSTORM with a new C# backdoor, GRIMBOLT, in September 2025. GRIMBOLT is compiled using Native AOT and packed with UPX. The malware provides remote shell access and reuses BRICKSTORM’s command-and-control channels.

“It provides a remote shell capability and uses the same command and control as previously deployed BRICKSTORM payload.” continues the report. “It’s unclear if the threat actor’s replacement of BRICKSTORM with GRIMBOLT was part of a pre-planned life cycle iteration by the threat actor or a reaction to incident response efforts led by Mandiant and other industry partners.”

The attackers ensured persistence by modifying a legitimate startup script so the backdoor runs automatically at boot.

While investigating compromised Dell RecoverPoint systems, Mandiant uncovered CVE-2026-22769 after spotting Tomcat Manager access using hardcoded admin credentials. Attackers uploaded a malicious WAR file containing the SLAYSTYLE web shell, gaining root command execution as early as mid-2024. The group also expanded into VMware environments, creating “Ghost NICs” for stealthy lateral movement and using iptables-based Single Packet Authorization to covertly redirect and control traffic on vCenter appliances.

Google released Indicators of Compromise (IOCs) and Yara rules for this campaign.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Dell RecoverPoint)




文章来源: https://securityaffairs.com/188176/apt/china-linked-apt-weaponized-dell-recoverpoint-zero-day-since-2024.html
如有侵权请联系:admin#unsafe.sh