Critical Dell Vulnerability Exploited by State-Sponsored Actors Since 2024
#Vulnerabilities

Critical Dell Vulnerability Exploited by State-Sponsored Actors Since 2024

Regulation Reporter
2 min read

Suspected China-linked threat actors exploited a Dell zero-day vulnerability since mid-2024 to deploy stealthy malware infrastructure, requiring immediate patching and forensic examination of Dell RecoverPoint systems.

Featured image

Security researchers from Google's Mandiant and Threat Intelligence Group have confirmed that suspected China-linked cyber espionage groups exploited a critical vulnerability (CVE-2026-22769) in Dell RecoverPoint for Virtual Machines as a zero-day since at least mid-2024. This maximum-severity flaw involves hardcoded credentials that allow unauthenticated attackers to gain root-level access to the underlying operating system.

Technical Exploitation Pattern

The threat cluster tracked as UNC6201 leveraged this vulnerability to:

  1. Deploy Brickstorm and Grimbolt backdoors for persistent remote access
  2. Create 'ghost NICs' (hidden network interfaces) on VMware ESXi virtual machines for stealthy lateral movement
  3. Modify legitimate system scripts (convert_hosts.sh) to execute malware at boot time via rc.local
  4. Use Apache Tomcat Manager to deploy Slaystyle web shells through malicious WAR files

Grimbolt represents an evolution of earlier Brickstorm variants, shifting from Go/Rust to C# with ahead-of-time compilation and UPX packing. This technical shift enhances evasion capabilities against static analysis tools while maintaining the same command-and-control infrastructure.

Compliance Requirements

Organizations using Dell RecoverPoint for Virtual Machines must implement these measures immediately:

  1. Patch Implementation: Apply Dell's security update for CVE-2026-22769 from the Dell Security Advisory
  2. Forensic Examination: Check systems for:
    • Modified convert_hosts.sh scripts
    • Unauthorized NIC configurations in VMware environments
    • Processes matching Grimbolt's AOT-compiled binaries
  3. Credential Reset: Replace all associated administrative credentials
  4. Historical Analysis: Organizations previously targeted by Brickstorm must search for Grimbolt artifacts

Critical Timeline

  • Mid-2024: Initial observed exploitation
  • September 2025: Threat actors shifted to Grimbolt backdoors
  • February 2026: Vulnerability disclosed and patched

Dell confirmed 'limited active exploitation' but cautions that the full scope remains unknown. Mandiant has observed fewer than a dozen confirmed compromises but emphasizes that all critical infrastructure operators—particularly in energy and government sectors—should assume they are potential targets given UNC6201's history of long-term embedded access.

The US Cybersecurity and Infrastructure Security Agency (CISA) has previously warned about similar VMware targeting tactics in CISA Alert AA26-137A. Security teams should cross-reference these detection mechanisms with Dell-specific indicators of compromise.

Comments

Loading comments...