On February 18, 2026, Mandiant and Google Threat Intelligence Group (GTIG) disclosed a long-running cyberespionage campaign by a suspected China-nexus threat actor tracked as UNC6201. The actor has been exploiting a critical zero-day vulnerability, CVE-2026-22769, in Dell RecoverPoint for Virtual Machines since at least mid-2024. This vulnerability, which involves hard-coded credentials, allows unauthenticated remote attackers to gain root-level access to affected appliances. The primary objective of the campaign appears to be espionage, focusing on gaining persistent access to VMware environments. The actor deployed a novel backdoor named GRIMBOLT for long-term access and data exfiltration. Dell has issued a patch, and organizations using the affected product are urged to apply it immediately due to active in-the-wild exploitation.
CVE-2026-22769 is a critical vulnerability in Dell RecoverPoint for Virtual Machines versions prior to 6.0. The flaw, rated with a CVSS score of 10.0, is due to hard-coded credentials for the admin user. These credentials are stored in the /home/kos/tomcat9/tomcat-users.xml file on the appliance's underlying operating system.
An unauthenticated remote attacker with knowledge of these default credentials can authenticate to the Apache Tomcat Manager service running on the appliance. This allows the attacker to upload malicious Web Application Archive (.war) files, effectively achieving remote code execution with root privileges. The ease of exploitation and the high level of access granted make this a particularly dangerous vulnerability.
The threat actor UNC6201 has demonstrated sophistication and patience, operating undetected for a significant period. The attack chain is as follows:
.war file containing a Java-based web shell, named SLAYSTYLE, is uploaded and deployed.GRIMBOLT is a C# backdoor compiled using Native Ahead-of-Time (AOT) and packed with UPX, making it difficult to analyze. To ensure persistence, the actor modifies the /home/kos/kbox/src/installation/distribution/convert_hosts.sh script, a legitimate system script that executes on boot.
Researchers have noted overlaps between UNC6201 and another China-linked group, UNC5221 (also known as Silk Typhoon), which has also been observed using the BRICKSTORM malware.
T1190 - Exploit Public-Facing Application: Exploitation of the vulnerability in the internet-facing Dell RecoverPoint appliance.T1078.001 - Default Accounts: Use of hard-coded credentials for the 'admin' user to gain initial access.T1105 - Ingress Tool Transfer: Uploading the malicious SLAYSTYLE .war file to the Tomcat server.T1505.003 - Server Software Component: Web Shell: The SLAYSTYLE malware functions as a web shell for command execution.T1037.004 - RC Scripts: The actor modified the convert_hosts.sh boot script to establish persistence for the GRIMBOLT backdoor.T1027 - Obfuscated Files or Information: The GRIMBOLT backdoor was packed with UPX to evade detection and hinder analysis.T1059.004 - Command and Scripting Interpreter: Unix Shell: Execution of commands via the web shell and modification of shell scripts for persistence.The exploitation of CVE-2026-22769 poses a severe risk to organizations. Dell RecoverPoint is a critical component of disaster recovery and business continuity strategies. A compromise of this system can lead to:
Security teams should hunt for the following indicators:
| Type | Value | Description |
|---|---|---|
| file_path | /home/kos/tomcat9/tomcat-users.xml |
Location of the hard-coded credentials. Monitor for access or modification. |
| file_path | /home/kos/kbox/src/installation/distribution/convert_hosts.sh |
Boot script modified by attackers for persistence. Monitor for unexpected changes. |
| url_pattern | /manager/html |
Default path for the Apache Tomcat Manager. Monitor for access from untrusted IP addresses. |
| process_name | java |
The Tomcat process. Monitor for suspicious child processes, such as /bin/sh or bash. |
| network_traffic_pattern | Outbound connections from RecoverPoint appliances | Establish a baseline and alert on any connections to unknown or suspicious external IP addresses. |
localhost_access_log.txt) and manager logs (manager.*.log) for successful authentications to the /manager/html interface from unexpected IP ranges. Look for PUT requests for .war files./home/kos/kbox/src/installation/distribution/convert_hosts.sh, to detect unauthorized modifications.D3-NTA - Network Traffic Analysis.java process spawning a shell.D3-SU - Software Update.D3-NI - Network Isolation.D3-ACH - Application Configuration Hardening.CISA adds Dell RecoverPoint zero-day (CVE-2026-22769) to KEV catalog, mandating urgent patching. UNC6201 campaign now targeting North American organizations, utilizing BRICKSTORM data stealer.
Dell RecoverPoint zero-day (CVE-2026-22769) added to CISA's KEV catalog, highlighting active exploitation and urging immediate patching.
Apply the patch from Dell immediately to fix the underlying vulnerability.
Mapped D3FEND Techniques:
Restrict access to the appliance's management interface to prevent unauthorized users from reaching the vulnerable service.
Mapped D3FEND Techniques:
Implement processes to change default credentials on all network devices and applications upon deployment.
Mapped D3FEND Techniques:
Routinely audit access logs for management interfaces to detect anomalous login patterns or suspicious activity.
Use endpoint security solutions to detect and block known malware like web shells and backdoors.
The primary and most effective countermeasure is to immediately apply the security update for Dell RecoverPoint for Virtual Machines (version 6.0.3.1 HF1 or later) that remediates CVE-2026-22769. This action directly closes the initial access vector used by UNC6201. Organizations should prioritize patching internet-facing appliances first, followed by internal ones. A robust patch management program should be in place to ensure such critical updates are deployed within a strict, risk-based timeline. Post-patch, it is crucial to verify the update was successful across all appliances. Given the active exploitation, this is not a routine update; it is an emergency change that should be fast-tracked through change management processes.
As a critical compensating control, organizations must enforce strict network isolation for the Dell RecoverPoint management interfaces. These interfaces should never be exposed directly to the internet. Access should be restricted using firewall rules to a dedicated and secured management VLAN or specific jump-box IP addresses. This prevents external attackers from reaching the vulnerable Tomcat service. For internal segmentation, ensure that only necessary administrative systems can communicate with the appliance's management ports. This greatly reduces the attack surface and contains the threat, even if other parts of the network are compromised. This directly counters the initial access phase of the attack chain.
Deploy network traffic analysis solutions to monitor all inbound and outbound connections from Dell RecoverPoint appliances. Establish a baseline of normal traffic patterns. Since these appliances should have very predictable communication channels (e.g., to ESXi hosts, vCenter, and other RecoverPoint appliances), any deviation is highly suspicious. Specifically, create alerts for: 1) Inbound connections to the Tomcat management port from any IP outside the defined management subnet. 2) Any outbound connection from the appliance to an external IP address, which could indicate C2 communication from GRIMBOLT or another backdoor. This continuous monitoring is vital for detecting post-compromise activity if a patch cannot be immediately applied or if the system was already compromised.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats