Close Menu
  • Home
  • Opinion
  • Region
    • Africa
    • Asia
    • Europe
    • Middle East
    • North America
    • Oceania
    • South America
  • AI & Machine Learning
  • Robotics & Automation
  • Space & Deep Tech
  • Web3 & Digital Economies
  • Climate & Sustainability Tech
  • Biotech & Future Health
  • Mobility & Smart Cities
  • Global Tech Pulse
  • Cybersecurity & Digital Rights
  • Future of Work & Education
  • Trend Radar & Startup Watch
  • Creator Economy & Culture
What's Hot

AI corporations with a ‘born international’ method are rewriting the playbook for tech startups 

February 18, 2026

What Is Grok AI? Elon Musk’s Controversial ChatGPT Rival

February 18, 2026

Utah’s Pure Wonders: Why the Beehive State Is an Eco-Traveler’s Dream

February 18, 2026
Facebook X (Twitter) Instagram LinkedIn RSS
NextTech NewsNextTech News
Facebook X (Twitter) Instagram LinkedIn RSS
  • Home
  • Africa
  • Asia
  • Europe
  • Middle East
  • North America
  • Oceania
  • South America
  • Opinion
Trending
  • AI corporations with a ‘born international’ method are rewriting the playbook for tech startups 
  • What Is Grok AI? Elon Musk’s Controversial ChatGPT Rival
  • Utah’s Pure Wonders: Why the Beehive State Is an Eco-Traveler’s Dream
  • YouTube monetization replace: What creators have to know as ‘AI slop’ overwhelms the platform
  • Did not Receive a License for SOLIDWORKS PDM Skilled
  • Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024
  • Meta inks deal to make use of tens of millions of Nvidia’s chips in information centre build-out
  • Microsoft says bug causes Copilot to summarize confidential emails
Wednesday, February 18
NextTech NewsNextTech News
Home - Cybersecurity & Digital Rights - Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024
Cybersecurity & Digital Rights

Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

NextTechBy NextTechFebruary 18, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
Follow Us
Google News Flipboard
Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024
Share
Facebook Twitter LinkedIn Pinterest Email


Ravie LakshmananFeb 18, 2026Zero-Day / Vulnerability

A most severity safety vulnerability in Dell RecoverPoint for Digital Machines has been exploited as a zero-day by a suspected China-nexus risk cluster dubbed UNC6201 since mid-2024, based on a brand new report from Google Mandiant and Google Menace Intelligence Group (GTIG).

The exercise entails the exploitation of CVE-2026-22769 (CVSS rating: 10.0), a case of hard-coded credentials affecting variations prior to six.0.3.1 HF1. Different merchandise, together with RecoverPoint Basic, usually are not susceptible to the flaw.

“That is thought of important as an unauthenticated distant attacker with information of the hardcoded credential may doubtlessly exploit this vulnerability, resulting in unauthorized entry to the underlying working system and root-level persistence,” Dell mentioned in a bulletin launched Tuesday.

The difficulty impacts the next merchandise –

  • RecoverPoint for Digital Machines Model 5.3 SP4 P1 – Migrate from RecoverPoint for Digital Machines 5.3 SP4 P1 to six.0 SP3, after which improve to six.0.3.1 HF1
  • RecoverPoint for Digital Machines Variations 6.0, 6.0 SP1, 6.0 SP1 P1, 6.0 SP1 P2, 6.0 SP2, 6.0 SP2 P1, 6.0 SP3, and 6.0 SP3 P1 – Improve to six.0.3.1 HF1
  • RecoverPoint for Digital Machines Variations 5.3 SP4, 5.3 SP3, 5.3 SP2, and earlier – Improve to model 5.3 SP4 P1 or a 6.x model, after which apply the mandatory remediation 

“Dell recommends that RecoverPoint for Digital Machines be deployed inside a trusted, access-controlled inner community protected by acceptable firewalls and community segmentation,” it famous. “RecoverPoint for Digital Machines shouldn’t be supposed to be used on untrusted or public networks.”

Per Google, the hard-coded credential pertains to an “admin” consumer for the Apache Tomcat Supervisor occasion that might be used authenticate to the Dell RecoverPoint Tomcat Supervisor, add an internet shell named SLAYSTYLE by way of the “/supervisor/textual content/deploy” endpoint, and execute instructions as root on the equipment to drop the BRICKSTORM backdoor and its newer model dubbed GRIMBOLT.

“This can be a C# backdoor compiled utilizing native ahead-of-time (AOT) compilation, making it more durable to reverse engineer,” Mandiant’s Charles Carmakal added.

Google informed The Hacker Information that the exercise has focused organizations throughout North America, with GRIMBOLT incorporating options to raised evade detection and reduce forensic traces on contaminated hosts. “GRIMBOLT is even higher at mixing in with the system’s personal native information,” it added.

UNC6201 can also be assessed to share overlaps with UNC5221, one other China-nexus espionage cluster recognized for its exploitation of virtualization applied sciences and Ivanti zero-day vulnerabilities to distribute internet shells and malware households like BEEFLUSH, BRICKSTORM, and ZIPLINE.

Regardless of the tactical similarities, the 2 clusters are assessed to be distinct at this stage. It is value noting that the usage of BRICKSTORM has additionally been linked by CrowdStrike to a 3rd China-aligned adversary tracked as Warp Panda in assaults aimed toward U.S. entities.

A noteworthy facet of the most recent set of assaults revolves round UNC6201’s reliance on non permanent digital community interfaces – known as “Ghost NICs” – to pivot from compromised digital machines into inner or SaaS environments, after which delete these NICs to cowl up the tracks in an effort to impede investigation efforts.

“According to the sooner BRICKSTORM marketing campaign, UNC6201 continues to focus on home equipment that sometimes lack conventional endpoint detection and response (EDR) brokers to stay undetected for lengthy durations,” Google mentioned.

Precisely how preliminary entry is obtained stays unclear, however like UNC5221, it is also recognized to focus on edge home equipment to interrupt into goal networks. An evaluation of the compromised VMware vCenter home equipment has additionally uncovered iptable instructions executed via the online shell to carry out the next set of actions –

  • Monitor incoming site visitors on port 443 for a particular HEX string
  • Add the supply IP handle of that site visitors to an inventory and if the IP handle is on the listing and connects to port 10443, the connection is ACCEPTED
  • Silently redirect subsequent site visitors to port 443 to port 10443 for the subsequent 300 seconds (5 minutes) if the IP is on the authorized listing

Moreover, the risk actor has been discovered changing previous BRICKSTORM binaries with GRIMBOLT in September 2025. Whereas GRIMBOLT additionally supplies a distant shell functionality and makes use of the identical command-and-control (C2) as BRICKSTORM, it is not recognized what prompted the shift to the harder-to-detect malware, and whether or not it was a deliberate transition or a response to public disclosures about BRICKSTORM.

“Nation-state risk actors proceed focusing on methods that do not generally assist EDR options, which makes it very onerous for sufferer organizations to know they’re compromised and considerably prolongs intrusion dwell instances,” Carmakal mentioned.

The disclosure comes as Dragos warned of assaults mounted by Chinese language teams like Volt Hurricane (aka Voltzite) to compromise Sierra Wi-fi Airlink gateways situated in electrical and oil and gasoline sectors, adopted by pivoting to engineering workstations to dump config and alarm information.

The exercise, based on the cybersecurity firm, passed off in July 2025. The hacking crew is alleged to accumulate preliminary entry from Sylvanite, which quickly weaponizes edge gadget vulnerabilities earlier than patches are utilized and palms off entry for deeper operational expertise (OT) intrusions.

“Voltzite moved past information exfiltration to direct manipulation of engineering workstations investigating what would set off processes to cease,” Dragos mentioned. ” This represents the elimination of the final sensible barrier between having entry and inflicting bodily penalties. Mobile gateways create unauthorized pathways into OT networks bypassing conventional safety controls.”

Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the most recent breakthroughs, get unique updates, and join with a worldwide community of future-focused thinkers.
Unlock tomorrow’s traits at this time: learn extra, subscribe to our e-newsletter, and turn into a part of the NextTech neighborhood at NextTech-news.com

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NextTech
  • Website

Related Posts

Operation DoppelBrand: Weaponizing Fortune 500 Manufacturers

February 18, 2026

Zscaler-SquareX Deal Expands Zero Belief & Safe Searching

February 17, 2026

260K+ Chrome Customers Duped by Faux AI Browser Extensions

February 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Economy News

AI corporations with a ‘born international’ method are rewriting the playbook for tech startups 

By NextTechFebruary 18, 2026

The flexibility to broaden throughout borders stays one of many key metrics of success for…

What Is Grok AI? Elon Musk’s Controversial ChatGPT Rival

February 18, 2026

Utah’s Pure Wonders: Why the Beehive State Is an Eco-Traveler’s Dream

February 18, 2026
Top Trending

AI corporations with a ‘born international’ method are rewriting the playbook for tech startups 

By NextTechFebruary 18, 2026

The flexibility to broaden throughout borders stays one of many key metrics…

What Is Grok AI? Elon Musk’s Controversial ChatGPT Rival

By NextTechFebruary 18, 2026

Briefly Grok is Elon Musk’s irreverent reply to ChatGPT—designed to be edgy,…

Utah’s Pure Wonders: Why the Beehive State Is an Eco-Traveler’s Dream

By NextTechFebruary 18, 2026

Utah earns its fame as a bucket-list vacation spot the second you…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

NEXTTECH-LOGO
Facebook X (Twitter) Instagram YouTube

AI & Machine Learning

Robotics & Automation

Space & Deep Tech

Web3 & Digital Economies

Climate & Sustainability Tech

Biotech & Future Health

Mobility & Smart Cities

Global Tech Pulse

Cybersecurity & Digital Rights

Future of Work & Education

Creator Economy & Culture

Trend Radar & Startup Watch

News By Region

Africa

Asia

Europe

Middle East

North America

Oceania

South America

2025 © NextTech-News. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Write For Us
  • Submit Article & Press Release

Type above and press Enter to search. Press Esc to cancel.

Subscribe For Latest Updates

Sign up to best of Tech news, informed analysis and opinions on what matters to you.

Invalid email address
 We respect your inbox and never send spam. You can unsubscribe from our newsletter at any time.     
Thanks for subscribing!