{"id":43797,"date":"2026-02-20T06:13:06","date_gmt":"2026-02-19T22:13:06","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/20\/china-linked-hackers-use-dell-recoverpoint-flaw-to-drop-grimbolt-malware\/"},"modified":"2026-02-20T06:13:06","modified_gmt":"2026-02-19T22:13:06","slug":"china-linked-hackers-use-dell-recoverpoint-flaw-to-drop-grimbolt-malware","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/20\/china-linked-hackers-use-dell-recoverpoint-flaw-to-drop-grimbolt-malware\/","title":{"rendered":"China-Linked Hackers Use Dell RecoverPoint Flaw to Drop GrimBolt Malware"},"content":{"rendered":"\n<p>A major security vulnerability has been identified in a <a href=\"https:\/\/hackread.com\/dell-unityvsa-flaw-command-execution-without-login\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dell<\/a> product used by many companies to protect their virtual data. According to reports from Google\u2019s Threat Intelligence Group (GTIG) and the cybersecurity firm Mandiant, a group of hackers linked to <a href=\"https:\/\/hackread.com\/china-hackers-hit-us-tech-firms-brickstorm-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">China<\/a> has been exploiting this weakness since at least mid-2024.<\/p>\n<p>The problem affects <a href=\"https:\/\/www.dell.com\/en-us\/lp\/dt\/data-protection-suite-recoverpoint-for-virtual-machines\" target=\"_blank\" rel=\"noreferrer noopener\">Dell RecoverPoint for Virtual Machines<\/a>, a tool designed to help businesses recover their data if their systems fail. As we know it, these types of tools are vital for keeping digital services running, which makes them a prime target for those looking to steal information.<\/p>\n<h3><strong>What Went Wrong?<\/strong><\/h3>\n<p>The issue, officially named <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-22769\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2026-22769<\/a>, involves hardcoded credentials. This means the software came with a built-in username and password that could not be easily changed.<\/p>\n<p>Google researchers noted that an outsider who knew these secret login details could gain total control over the system. Specifically, the flaw allowed attackers to log in as an administrator to the software&#8217;s management system and execute commands with the highest level of authority.<\/p>\n<p>Further investigation by Mandiant revealed that the hackers, a group identified as UNC6201, used these details to break into networks. Once inside, they could move around freely and install malicious software to spy on the affected organisations. In one instance, the hackers used a technique called Ghost NICs, where they created temporary virtual network ports to move through the network without leaving a trace.<\/p>\n<h3><strong>New Malware GrimBolt Discovered<\/strong><\/h3>\n<p>According to Mandiant and GTIG\u2019s investigation, the hackers have been using a specific type of digital spy tool called <a href=\"https:\/\/hackread.com\/chinese-state-hackers-brickstorm-vmware-systems\/\" target=\"_blank\" rel=\"noreferrer noopener\">BrickStorm<\/a>, but in September 2025, they began switching to a more advanced piece of malware named GrimBolt.<\/p>\n<p>They also noted that GrimBolt is particularly tricky because it is designed to be very fast and hard for security teams to study. It acts as a <a href=\"https:\/\/hackread.com\/backdoors-npm-packages-attackers-wipe-systems\/\" target=\"_blank\" rel=\"noreferrer noopener\">backdoor<\/a>, which is a way for hackers to sneak back into a system whenever they want without being noticed. In this case, the hackers even modified the software&#8217;s startup scripts, ensuring that \u201cthis shell script is executed by the appliance at boot time,\u201d allowing the malware to remain active indefinitely, Google\u2019s <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/unc6201-exploiting-dell-recoverpoint-zero-day\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a> reveals.<\/p>\n<h3><strong>How to Stay Safe<\/strong><\/h3>\n<p>Dell has released an official security advisory (<a href=\"https:\/\/www.dell.com\/support\/kbdoc\/en-us\/000426773\/dsa-2026-079\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DSA-2026-079<\/a>) urging all users to update their software immediately. The vulnerability is considered critical, receiving the highest possible risk score of 10.0. Dell advised that the flaw \u201cis considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability.\u201d<\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<p>To fix the issue, Dell recommends that customers update to version 6.0.3.1 HF1 or newer as soon as possible. If an immediate update is not possible, users should run a specific security script provided by Dell and ensure the software is kept within a protected internal network rather than being exposed to the public internet.<\/p>\n<h3><strong>Expert Commentary<\/strong><\/h3>\n<p>In comments shared with hackread.com, industry experts expressed deep concern over the strategic nature of these attacks. Mayuresh Dani, Security Research Manager at Qualys Threat Research Unit, explained that the hackers are \u201cdeliberately going after the backup\/replication control plane.\u201d <\/p>\n<p>Dani noted that this isn&#8217;t just a random attack, as the group \u201cunderstands modern VMware DR architectures and knows how to live in them quietly,\u201d and warned that because this software orchestrates how data is restored, a compromised system \u201ccan influence which copies of data get replicated, where they go, and what gets restored in a disaster.\u201d<\/p>\n<p>Shane Barney, Chief Information Security Officerat Keeper Security, added that targeting these platforms is a calculated move to weaken a company&#8217;s ability to recover from any disruption. Barney noted that state-sponsored actors are patient and that \u201ccompromising resilience infrastructure is not opportunistic \u2013 it\u2019s strategic.\u201d<\/p>\n<p>The root cause, according to Jeremiah Clark, Chief Technology Officerat Fenix24, is often a simple human error during the software&#8217;s creation. Clark further added that developers sometimes use hardcoded credentials to save time when testing and &#8220;simply forget to go back and change them as the next wave of work piles up.&#8221;<\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" rel=\"author\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" rel=\"author\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"China-Linked Hackers Use Dell RecoverPoint Flaw to Drop GrimBolt Malware\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform\u2019s trusted coverage.\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A major security vulnerability has been identified in a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-43797","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43797","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43797"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43797\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}