Close Menu
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
X (Twitter) Instagram Threads LinkedIn WhatsApp
Trending
  • Dell RecoverPoint Zero-Day Vulnerability Exploited by Chinese Hackers Since Mid-2024
  • CVE-2026-1731: Critical BeyondTrust RCE Exploited
  • UK Cyber Essentials Campaign Urges SMEs to Lock the Digital Door
  • AI Impact Summit Cybersecurity Alert: India Activates G20-Level Shield Against Deepfake and Ransomware Threats
  • Claude Artifacts ClickFix macOS Infostealer: Dangerous AI Malware Campaign
  • How Attackers Use Company Language to Guess Passwords
  • Flickr Confirms Potential Data Breach via Third-Party Email Service
  • Record 31.4 Tbps DDoS Attack Exposes AISURU/Kimwolf Botnet Power
Wednesday, February 18
Cyber infosCyber infos
X (Twitter) Instagram LinkedIn WhatsApp
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
Cyber infosCyber infos
Cyber attacks

Dell RecoverPoint Zero-Day Vulnerability Exploited by Chinese Hackers Since Mid-2024

Cyber infosBy Cyber infosFebruary 18, 2026Updated:February 18, 2026No Comments6 Mins Read
Facebook Twitter Pinterest LinkedIn Email WhatsApp Copy Link
Follow Us
X (Twitter) Instagram LinkedIn WhatsApp Telegram Threads
Share
Facebook Twitter Pinterest Threads Copy Link

For many IT teams, backup systems are the quiet workhorses of the environment. They sit in the background, replicating virtual machines and preparing for worst-case scenarios that hopefully never arrive. But over the past 18 months, one of those trusted systems became a silent entry point.A critical Dell RecoverPoint zero-day vulnerability, tracked as CVE-2026-22769, has been exploited by a China-linked threat group since at least mid-2024.
The flaw allowed attackers to authenticate using hardcoded credentials and gain full root-level control over affected appliances. From there, they deployed custom malware, established long-term persistence, and pivoted deeper into VMware infrastructure.
The affected product, Dell RecoverPoint for Virtual Machines (RP4VM), is widely used for replication and disaster recovery across enterprise VMware environments. When attackers compromise backup systems, they gain more than access they gain visibility into recovery strategies, replication paths, and core workloads.
Table of Contents hide
1 Incident Overview: CVE-2026-22769
2 What Is Dell RecoverPoint for Virtual Machines?
3 Who Is Behind the Exploitation?
4 How the Dell RecoverPoint Zero-Day Was Exploited
5 Who Is Most at Risk?
6 Protection & Mitigation Steps
7 Strategic Takeaways
8 FAQ: Dell RecoverPoint Zero-Day Vulnerability
9 Final Thoughts

Incident Overview: CVE-2026-22769

The vulnerability at the center of this campaign is a hardcoded credential flaw (CWE-798) embedded within the RecoverPoint appliance.

  • Severity: CVSS 10.0 (Critical)
  • Access Required: None (if interface is reachable)
  • Impact: Unauthenticated login leading to full OS-level compromise
  • Affected Versions: Prior to 6.0.3.1 HF1 and certain 5.3.x builds

The issue stems from static administrative credentials inherited from the appliance’s Apache Tomcat configuration. If attackers knew the embedded password, they could authenticate directly no phishing, no brute force, no privilege escalation required.

Dell addressed the issue in advisory DSA-2026-079 and strongly recommends upgrading immediately.

Dell RecoverPoint Zero-Day Vulnerability Exploited by Chinese Hackers Since Mid-2024

What Is Dell RecoverPoint for Virtual Machines?

Dell RecoverPoint for Virtual Machines integrates directly with:

  • VMware vSphere
  • VMware vCenter

It enables:

  • Continuous VM replication
  • Point-in-time recovery
  • Cross-site disaster recovery
  • Backup integrity management

Because RP4VM sits close to production workloads and often within management networks, compromise provides:

  • Access to replicated VM data
  • Visibility into infrastructure topology
  • Potential tampering with backup integrity
  • A pivot point into core VMware estates

Backup appliances are often trusted implicitly. They rarely run endpoint detection agents and may not feed detailed telemetry into SIEM platforms. That blind spot makes them appealing targets.

Who Is Behind the Exploitation?

The activity has been attributed to a China-linked threat cluster known as UNC6201, tracked by Mandiant and Google Threat Intelligence Group (GTIG).

The group has demonstrated a consistent operating model:

  • Target infrastructure and edge appliances
  • Avoid noisy intrusion methods
  • Maintain long dwell times
  • Continuously refine malware tooling

Researchers observed deployment of two primary backdoors: Brickstorm and the newer Grimbolt. In some environments, Brickstorm was replaced over time by Grimbolt, suggesting active maintenance of access rather than one-off exploitation.

How the Dell RecoverPoint Zero-Day Was Exploited

1. Initial Access via Tomcat Manager

Attackers authenticated to the embedded Apache Tomcat Manager interface using the hardcoded admin credentials. Because authentication was technically valid, this activity could blend into normal administrative traffic.

2. Root Access and Persistence

Once inside, attackers escalated privileges to root and modified legitimate startup scripts specifically convert_hosts.sh ensuring malware execution at boot via rc.local. This persistence mechanism leveraged existing system behavior rather than introducing obvious new services.

3. Malware Deployment

The following malware families were observed:

  • Brickstorm: A Go-based backdoor targeting VMware infrastructure
  • Grimbolt: A C# implant optimized for stealth and performance on resource-constrained appliances
  • Slaystyle: Used for additional post-exploitation operations

Grimbolt appears engineered to reduce static detection signatures and improve runtime efficiency an evolution that reflects operational maturity.

4. “Ghost NIC” Lateral Movement

Investigators observed the creation of temporary or undocumented virtual network interfaces sometimes referred to as “Ghost NICs” on ESXi hosts. These allowed attackers to pivot across network segments without using traditional remote access pathways like VPN or RDP.

Who Is Most at Risk?

Organizations most at risk include:

  • Enterprises running unpatched RP4VM versions
  • Government and critical infrastructure operators
  • Large VMware-based data centers
  • Organizations exposing management interfaces externally

Even internally exposed appliances can present risk if attackers gain a foothold elsewhere in the network. Given the extended exploitation window, organizations should treat vulnerable deployments as potentially compromised.

Protection & Mitigation Steps

Upgrade Immediately

  • Install version 6.0.3.1 HF1 or later
  • Follow Dell’s upgrade path for 5.3.x environments

Patching prevents new exploitation but does not remove existing persistence mechanisms.

Assume Potential Compromise

  • Review Tomcat Manager access logs
  • Inspect startup scripts for modifications
  • Search for unfamiliar binaries
  • Audit ESXi hosts for undocumented NICs

Restrict Management Exposure

  • Remove public access to management interfaces
  • Limit access to dedicated management VLANs
  • Enforce VPN and MFA for administrative access

Rotate and Audit Credentials

  • Reset administrative credentials post-patch
  • Review service accounts tied to VMware management
  • Enable MFA where supported

Enhance Monitoring

  • Forward RP4VM logs into SIEM
  • Alert on startup script changes
  • Monitor for unexpected virtual NIC creation

Strategic Takeaways

This Dell RecoverPoint zero-day vulnerability highlights a growing pattern: attackers are targeting infrastructure appliances that blend into enterprise environments. Backup platforms, hypervisors, storage systems, and management tools are increasingly attractive because they combine high privilege with low monitoring.

Security strategies that focus exclusively on endpoints leave dangerous blind spots. Virtualization and disaster recovery infrastructure must now be treated as Tier-1 monitored assets.

FAQ: Dell RecoverPoint Zero-Day Vulnerability

What is the Dell RecoverPoint zero-day vulnerability?

CVE-2026-22769 is a hardcoded credential flaw that allows unauthenticated attackers to gain root access to vulnerable RecoverPoint for Virtual Machines appliances.

How long was the vulnerability exploited?

Researchers assess that exploitation began in mid-2024 and continued for approximately 18 months before public disclosure.

Does patching remove malware?

No. Patching blocks new exploitation but does not automatically remove persistence mechanisms. A forensic review may be required.

Was ransomware involved?

Public reporting indicates espionage-focused activity rather than ransomware deployment.

Should backup appliances be internet-facing?

Best practice is to restrict management interfaces to isolated networks protected by strong authentication controls.

Final Thoughts

The Dell RecoverPoint zero-day vulnerability serves as a reminder that attackers increasingly target the systems organizations rely on for resilience. When backup platforms are compromised, the consequences extend beyond data access they affect trust, recovery capability, and operational continuity.

If your organization runs RecoverPoint, prioritize patching immediately. Then go further: review logs, audit persistence mechanisms, and validate that your disaster recovery platform is not quietly serving as an attacker foothold.

Follow on X (Twitter) Follow on Instagram Follow on LinkedIn Follow on WhatsApp Follow on Threads
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleCVE-2026-1731: Critical BeyondTrust RCE Exploited
Cyber infos
  • Website

Related Posts

UK Cyber Essentials Campaign Urges SMEs to Lock the Digital Door

February 17, 2026
Read More

AI Impact Summit Cybersecurity Alert: India Activates G20-Level Shield Against Deepfake and Ransomware Threats

February 17, 2026
Read More

Claude Artifacts ClickFix macOS Infostealer: Dangerous AI Malware Campaign

February 14, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber news

Dell RecoverPoint Zero-Day Vulnerability Exploited by Chinese Hackers Since Mid-2024

February 18, 2026

UK Cyber Essentials Campaign Urges SMEs to Lock the Digital Door

February 17, 2026

AI Impact Summit Cybersecurity Alert: India Activates G20-Level Shield Against Deepfake and Ransomware Threats

February 17, 2026

Claude Artifacts ClickFix macOS Infostealer: Dangerous AI Malware Campaign

February 14, 2026

Top 10

Top 10 Cybersecurity Resolutions Every User Should Make in 2026

January 1, 2026

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

mobile security

Google Is Finally Letting Users Change Gmail Address – Here’s How It Works

December 26, 2025

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025

How to Use a VPN to Protect Your Privacy in 2026 (Step-by-Step Guide)

December 13, 2025
Archives
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

Dell RecoverPoint Zero-Day Vulnerability Exploited by Chinese Hackers Since Mid-2024

February 18, 2026

CVE-2026-1731: Critical BeyondTrust RCE Exploited

February 18, 2026

UK Cyber Essentials Campaign Urges SMEs to Lock the Digital Door

February 17, 2026

AI Impact Summit Cybersecurity Alert: India Activates G20-Level Shield Against Deepfake and Ransomware Threats

February 17, 2026

Claude Artifacts ClickFix macOS Infostealer: Dangerous AI Malware Campaign

February 14, 2026
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

We delivers trusted cybersecurity updates, expert analysis, and online safety tips. We help individuals and businesses understand cyber threats and protect their digital world with accurate, easy-to-read information.

Partners
White Hat Hub Partner
X (Twitter) Instagram Pinterest LinkedIn WhatsApp Threads
  • Contact us
  • Sitemaps
© 2026 Cyberinfos - All Rights are Reserved

Type above and press Enter to search. Press Esc to cancel.