Tagged: 24/7 SOC monitoring, APT, Dell, Managed SOC in the Philippines, MSOC in the Philippines, MSOC services, Security Operations Center as a Service, SOC outsourcing
- This topic has 1 reply, 2 voices, and was last updated 2 weeks, 6 days ago by
Alpert Sebastian.
- AuthorPosts
- February 23, 2026 at 11:23 am #1637
Rameses Quiambao
ParticipantSummary
On February 18, 2026, Google Threat Intelligence Group (GTIG) and Mandiant reported active exploitation of a critical zero-day vulnerability affecting Dell RecoverPoint for Virtual Machines.
The vulnerability:
• CVE-2026-22769The flaw allows an unauthenticated remote attacker with knowledge of a hardcoded credential to gain unauthorized access to the system and potentially achieve root-level persistence.
The activity has been attributed to a China-linked cyberespionage threat actor tracked as UNC6201, which has been active since at least 2024.
Research Source
According to Google Threat Intelligence Group (GTIG) and Mandiant, the threat actor used the vulnerability for long-term espionage operations including persistence, lateral movement, and malware deployment.
Researchers also identified links between UNC6201 and another China-nexus APT group UNC5221, known for maintaining access inside victim networks for extended periods.
Technical Details
The vulnerability is a hardcoded credential issue affecting Dell RecoverPoint for Virtual Machines versions prior to 6.0.3.1 HF1.
Successful exploitation may allow attackers to:
• Access the underlying operating system
• Establish root-level persistence
• Deploy additional malware
• Move laterally across virtualized infrastructureDell RecoverPoint is a disaster recovery and resilience platform used for VMware virtual machines, making it a high-value enterprise infrastructure target.
Observed Attack ActivityMalware Deployment
• GrimBolt backdoor (C# AOT compiled, UPX packed)
• BrickStorm malwareWeb Shells
• SlayStyle web shellPost-Exploitation Behavior
• Lateral movement
• Persistence mechanisms
• Remote shell access
• Data collectionEvasion Techniques
• Creation of “ghost NICs” on virtual machines
• Removal of NICs after operations to hide activityAttackers primarily targeted systems that typically do not run endpoint detection tools, increasing dwell time.
Impact
Compromise of RecoverPoint infrastructure may allow attackers to:
• Access backup and disaster recovery environments
• Maintain stealth persistence in virtual infrastructure
• Move laterally into production systems
• Deploy malware across virtual machines
• Conduct long-term espionage operationsBecause RecoverPoint operates within virtualization and backup systems, compromise may give attackers access to the entire virtual environment.
Mitigation
Dell advises updating immediately to:
• RecoverPoint for Virtual Machines 6.0.3.1 HF1 or laterRecommended actions:
1. Patch affected RecoverPoint systems immediately
2. Hunt for web shells and unknown services
3. Check virtual machines for unauthorized NIC changes
4. Review lateral movement activity in VMware environment
5. Monitor backup infrastructure access
6. Review GTIG/Mandiant indicators of compromise (IoCs)Organizations should assume compromise if vulnerable systems were internet-accessible.
References:
• Google Threat Intelligence Group (GTIG) & Mandiant Research
• SecurityWeek: https://www.securityweek.com/dell-recoverpoint-zero-day-exploited-by-chinese-cyberespionage-group/February 27, 2026 at 10:24 am #1750Alpert Sebastian
ParticipantThis article shows how attackers can take advantage of vulnerabilities in backup systems like Dell RecoverPoint for Virtual Machines. The issue allowed unauthorized access and long-term persistence, which is especially risky since these systems are often not closely monitored.
Organizations using affected versions should patch immediately and check for signs of compromise such as web shells, unusual network changes, and lateral movement. This highlights the need to secure and monitor backup and virtualization infrastructure, not just production systems.
- AuthorPosts
- You must be logged in to reply to this topic.