Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Industrial Control System Vulnerabilities Hit Record Highs

February 19, 2026

Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

February 19, 2026

Why Your Organization Should Start Quantum Preparedness Today

February 19, 2026
Facebook X (Twitter) Instagram
Thursday, February 19
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Chinese APT Group Exploits Dell Zero-Day for Two Years
News

Chinese APT Group Exploits Dell Zero-Day for Two Years

Team-CWDBy Team-CWDFebruary 18, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Dell yesterday released a patch for a critical zero-day vulnerability in its RecoverPoint for Virtual Machines product, which Mandiant said has been silently exploited by a Chinese APT group since 2024.

CVE-2026-22769 is a hardcoded credential bug with a maximum CVSS score of 10.0.

An unauthenticated attacker with knowledge of the credential could easily gain access to the underlying OS and root-level persistence, Dell warned.

The zero-day vulnerability affects versions of the data backup and recovery solution prior to 6.0.3.1 HF1.

Read more on Chinese APT groups: European Governments Breached in Zero-Day Attacks Targeting Ivanti.

Mandiant said in a report published on February 18 that it traced back exploitation of CVE-2026-22769 as far as mid-2024, although there may have been activity prior to this.

“Analysis of incident response engagements revealed that UNC6201, a suspected PRC-nexus threat cluster, has exploited this flaw since at least mid-2024 to move laterally, maintain persistent access, and deploy malware including Slaystyle, Brickstorm, and a novel backdoor tracked as Grimbolt,” it explained.

“The initial access vector for these incidents was not confirmed, but UNC6201 is known to target edge appliances (such as VPN concentrators) for initial access.”

In September last year, the group replaced the Brickstorm backdoor, which has been tied to Chinese cyber-espionage activity since at least March that year, with Grimbolt.

The new backdoor is apparently written in C# and compiled using native ahead-of-time (AOT) techniques to help evade analysis and improve performance.

“Unlike traditional .NET software that uses just-in-time (JIT) compilation at runtime, Native AOT-compiled binaries, introduced to .NET in 2022, are converted directly to machine-native code during compilation,” Mandiant explained.

“This approach enhances the software’s performance on resource-constrained appliances, ensures required libraries are already present in the file, and complicates static analysis by removing the common intermediate language (CIL) metadata typically associated with C# samples.”

Grimbolt, which provides a remote shell capability, uses the same command-and-control (C2) infrastructure as Brickstorm, the report added.

Mandiant Reveals Novel TTPs

Mandiant also observed UNC6201 using novel tactics to target VMware virtual infrastructure.

This includes the creation of new temporary network ports, or “ghost NICs,” on VMs running on an ESXi server.

“Using these network ports, the threat actor then pivoted to various internal and software-as-a-service (SaaS) infrastructures used by the affected organizations,” the report noted.

Mandiant also revealed the use of iptables for single packet authorization (SPA).

The report claimed there are overlaps between UNC6201 and UNC5221, which has been tied to zero-day attacks on government agencies using Ivanti products.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution
Next Article Why Ransomware Remains One of Cybersecurity’s Most Persistent Threats
Team-CWD
  • Website

Related Posts

News

Industrial Control System Vulnerabilities Hit Record Highs

February 19, 2026
News

Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

February 19, 2026
News

Researchers Reveal Six New OpenClaw Vulnerabilities

February 19, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What it is and how to protect yourself

January 8, 2026

Can password managers get hacked? Here’s what to know

November 14, 2025

How to help older family members avoid scams

October 31, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.