Threat Intelligence 3 min read CVSS 10.0

Chinese APT: a Dell zero-day silently exploited for 2 years

Key Takeaways

  • CVE-2026-22769 (CVSS 10.0): hardcoded credential in Dell RecoverPoint for Virtual Machines
  • Exploited since mid-2024 by UNC6201, a China-linked group, without detection
  • Three malware strains deployed: Slaystyle, Brickstorm, and Grimbolt (novel backdoor)
  • Root persistence and lateral movement across victim networks

2 years in the shadows: UNC6201’s silent espionage

Mandiant revealed that a China-linked APT group, tracked as UNC6201, has been exploiting a zero-day vulnerability in Dell RecoverPoint for Virtual Machines since mid-2024. For nearly two years, the attackers maintained persistent root access in victim networks without detection.

CVE-2026-22769: CVSS 10.0

FieldDetail
CVECVE-2026-22769
CVSS10.0 (maximum)
TypeHardcoded credential
ProductDell RecoverPoint for VMs < 6.0.3.1 HF1
AuthenticationNone required
PrivilegesRoot

A hardcoded password embedded in the Dell product. Anyone who knows it gets immediate root access. This type of flaw is invisible to traditional vulnerability scanners.

UNC6201: the group behind the attack

UNC6201 is a China-attributed espionage group. Their playbook: targeting network edge appliances (VPN concentrators, backup appliances, edge devices), long-term persistence for intelligence collection, and stealth-designed malware.

Arsenal deployed

  • Slaystyle: first-stage malware for initial access and command execution
  • Brickstorm: lateral movement and persistence (known from prior China-linked campaigns)
  • Grimbolt: novel backdoor discovered for the first time in this campaign

Why backup appliances are targets

Dell RecoverPoint is a VM backup and replication system. Compromising it provides access to all protected VMs (and their data), snapshots and backups (potentially more history than live storage), the management network, and hypervisor credentials.

The 2-year dwell time lesson

EDR tools typically don’t cover proprietary appliances, vulnerability scanners don’t detect hardcoded credentials, appliance logs are rarely integrated into SIEMs, and firmware updates are often delayed by infrastructure teams.

Remediation

  1. Update Dell RecoverPoint to version 6.0.3.1 HF1 or later
  2. Audit your appliances: if you run RecoverPoint, assume it may have been compromised
  3. Search for IoCs: Slaystyle, Brickstorm, Grimbolt presence
  4. Integrate appliances into monitoring: backup, VPN, and edge devices must send logs to SIEM
  5. Segment: backup appliances should not be accessible from the user network

These are affiliate links. If you make a purchase through these links, we may earn a commission at no extra cost to you.

Sources

Share :

Advertisement

Related Articles