{"id":43765,"date":"2026-02-19T00:12:42","date_gmt":"2026-02-18T16:12:42","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/19\/chinese-apt-group-exploits-dell-zero-day-for-two-years-infosecurity-magazine\/"},"modified":"2026-02-19T00:12:42","modified_gmt":"2026-02-18T16:12:42","slug":"chinese-apt-group-exploits-dell-zero-day-for-two-years-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/19\/chinese-apt-group-exploits-dell-zero-day-for-two-years-infosecurity-magazine\/","title":{"rendered":"Chinese APT Group Exploits Dell Zero-Day for Two Years &#8211; Infosecurity Magazine"},"content":{"rendered":"<p>Dell has released a patch for a critical zero-day vulnerability in its RecoverPoint for Virtual Machines product, which Mandiant said has been silently exploited by a Chinese APT group since 2024.<\/p>\n<p>CVE-2026-22769 is a hardcoded credential bug with a maximum CVSS score of 10.0.<\/p>\n<p>An unauthenticated attacker with knowledge of the credential could easily gain access to the underlying OS and root-level persistence, Dell <a href=\"https:\/\/www.dell.com\/support\/kbdoc\/en-uk\/000426773\/dsa-2026-079\" target=\"_blank\">warned<\/a>.<\/p>\n<p>The zero-day vulnerability affects versions of the data backup and recovery solution prior to 6.0.3.1 HF1.<\/p>\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/european-governments-zeroday\/\" target=\"_blank\"><em>Read more on Chinese APT groups: European Governments Breached in Zero-Day Attacks Targeting Ivanti.<\/em><\/a><\/p>\n<p>Mandiant said in a report published on February 18&nbsp;that it traced back exploitation of CVE-2026-22769 as far as mid-2024, although there may have been activity prior to this.<\/p>\n<p>&ldquo;Analysis of incident response engagements revealed that&nbsp;UNC6201, a suspected PRC-nexus threat cluster, has exploited this flaw since at least mid-2024 to move laterally, maintain persistent access, and deploy malware including&nbsp;Slaystyle,&nbsp;Brickstorm, and a novel backdoor tracked as&nbsp;Grimbolt,&rdquo; it explained.<\/p>\n<p>&ldquo;The initial access vector for these incidents was not confirmed, but&nbsp;UNC6201&nbsp;is known to target edge appliances (such as VPN concentrators) for initial access.&rdquo;<\/p>\n<p>In September last year, the group replaced the<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/chinese-hackers-brickstorm\/\" target=\"_blank\"> Brickstorm backdoor<\/a>, which has been tied to Chinese cyber-espionage activity <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/china-hackers-brickstorm-backdoor\/\" target=\"_blank\">since at least March<\/a> that year, with Grimbolt.<\/p>\n<p>The new backdoor is apparently written in C# and compiled using native ahead-of-time (AOT) techniques to help evade analysis and improve performance.<\/p>\n<p>&ldquo;Unlike traditional .NET software that uses just-in-time (JIT) compilation at runtime, Native AOT-compiled binaries, introduced to .NET in 2022, are converted directly to machine-native code during compilation,&rdquo; Mandiant explained.<\/p>\n<p>&ldquo;This approach enhances the software&rsquo;s performance on resource-constrained appliances, ensures required libraries are already present in the file, and complicates static analysis by removing the common intermediate language (CIL) metadata typically associated with C# samples.&rdquo;<\/p>\n<p>Grimbolt, which provides a remote shell capability, uses the same command-and-control (C2) infrastructure as Brickstorm, the report added.<\/p>\n<h2><strong>Mandiant Reveals Novel TTPs<\/strong><\/h2>\n<p>Mandiant also observed UNC6201 using novel tactics to target VMware virtual infrastructure.<\/p>\n<p>This includes&nbsp;the creation of new temporary network ports, or &ldquo;ghost NICs,&rdquo; on VMs running on an ESXi server.<\/p>\n<p>&ldquo;Using these network ports, the threat actor then pivoted to various internal and software-as-a-service (SaaS) infrastructures used by the affected organizations,&rdquo; the report noted.<\/p>\n<p><a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/unc6201-exploiting-dell-recoverpoint-zero-day\/\" target=\"_blank\">Mandiant also revealed<\/a> the use of iptables for single packet authorization (SPA).<\/p>\n<p>The report claimed there are overlaps between UNC6201 and UNC5221, which has been tied to zero-day attacks on government agencies using <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/chinese-state-hackers-ivanti-flaw\/\" target=\"_blank\">Ivanti products.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dell has released a patch for a critical zero-day vulne [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-43765","post","type-post","status-publish","format-standard","hentry","category--infosecurity-magazine"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43765"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43765\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}