Chinese APT UNC6201 Weaponizes Dell Zero-Day to Deploy GRIMBOLT Backdoor in VMware Environments

Suspected Chinese Actor UNC6201 Exploits Critical Dell Zero-Day (CVE-2026-22769) in Long-Term Espionage Campaign

CRITICAL
February 18, 2026
February 27, 2026
6m read
VulnerabilityThreat ActorCyberattack

Related Entities(initial)

Threat Actors

UNC6201UNC5221

Organizations

Dell Mandiant Google Threat Intelligence Group (GTIG)VMware

Products & Tech

Dell RecoverPoint for Virtual MachinesApache Tomcat

Other

GRIMBOLTSLAYSTYLEBRICKSTORMGoogle People's Republic of China (PRC)

CVE Identifiers

CVE-2026-22769
CRITICAL
CVSS:10

Full Report(when first published)

Executive Summary

On February 18, 2026, Mandiant and Google Threat Intelligence Group (GTIG) disclosed a long-running cyberespionage campaign by a suspected China-nexus threat actor tracked as UNC6201. The actor has been exploiting a critical zero-day vulnerability, CVE-2026-22769, in Dell RecoverPoint for Virtual Machines since at least mid-2024. This vulnerability, which involves hard-coded credentials, allows unauthenticated remote attackers to gain root-level access to affected appliances. The primary objective of the campaign appears to be espionage, focusing on gaining persistent access to VMware environments. The actor deployed a novel backdoor named GRIMBOLT for long-term access and data exfiltration. Dell has issued a patch, and organizations using the affected product are urged to apply it immediately due to active in-the-wild exploitation.


Vulnerability Details

CVE-2026-22769 is a critical vulnerability in Dell RecoverPoint for Virtual Machines versions prior to 6.0. The flaw, rated with a CVSS score of 10.0, is due to hard-coded credentials for the admin user. These credentials are stored in the /home/kos/tomcat9/tomcat-users.xml file on the appliance's underlying operating system.

An unauthenticated remote attacker with knowledge of these default credentials can authenticate to the Apache Tomcat Manager service running on the appliance. This allows the attacker to upload malicious Web Application Archive (.war) files, effectively achieving remote code execution with root privileges. The ease of exploitation and the high level of access granted make this a particularly dangerous vulnerability.

Threat Overview

The threat actor UNC6201 has demonstrated sophistication and patience, operating undetected for a significant period. The attack chain is as follows:

  1. Initial Access: The actor scans for and identifies vulnerable Dell RecoverPoint appliances exposed to the internet or accessible from a compromised network segment.
  2. Exploitation: Using the hard-coded credentials, the actor authenticates to the Tomcat Manager interface.
  3. Payload Delivery: A malicious .war file containing a Java-based web shell, named SLAYSTYLE, is uploaded and deployed.
  4. Command and Control: The SLAYSTYLE web shell provides the actor with the ability to execute arbitrary commands on the system as the root user.
  5. Persistence and Lateral Movement: The actor uses this initial foothold to install more persistent backdoors. Initially, a backdoor known as BRICKSTORM was used. Starting in September 2025, UNC6201 began deploying a new, more advanced backdoor named GRIMBOLT.

GRIMBOLT is a C# backdoor compiled using Native Ahead-of-Time (AOT) and packed with UPX, making it difficult to analyze. To ensure persistence, the actor modifies the /home/kos/kbox/src/installation/distribution/convert_hosts.sh script, a legitimate system script that executes on boot.

Researchers have noted overlaps between UNC6201 and another China-linked group, UNC5221 (also known as Silk Typhoon), which has also been observed using the BRICKSTORM malware.

Technical Analysis

MITRE ATT&CK TTPs

Impact Assessment

The exploitation of CVE-2026-22769 poses a severe risk to organizations. Dell RecoverPoint is a critical component of disaster recovery and business continuity strategies. A compromise of this system can lead to:

  • Complete System Takeover: Attackers gain root access, allowing them to control the entire appliance.
  • Espionage and Data Theft: The primary motive of UNC6201 is espionage. Attackers can exfiltrate sensitive data stored within backups or use the compromised appliance as a pivot point to move laterally into the broader VMware virtualized environment.
  • Ransomware and Sabotage: While this campaign is focused on espionage, a compromised recovery appliance could be used by other actors to delete or encrypt backups, rendering an organization unable to recover from a ransomware attack or other catastrophic failure.
  • Supply Chain Risk: As the appliance manages backups for virtual machines, the compromise could potentially extend to the integrity of VM snapshots and replicated data.

Cyber Observables for Detection

Security teams should hunt for the following indicators:

Type Value Description
file_path /home/kos/tomcat9/tomcat-users.xml Location of the hard-coded credentials. Monitor for access or modification.
file_path /home/kos/kbox/src/installation/distribution/convert_hosts.sh Boot script modified by attackers for persistence. Monitor for unexpected changes.
url_pattern /manager/html Default path for the Apache Tomcat Manager. Monitor for access from untrusted IP addresses.
process_name java The Tomcat process. Monitor for suspicious child processes, such as /bin/sh or bash.
network_traffic_pattern Outbound connections from RecoverPoint appliances Establish a baseline and alert on any connections to unknown or suspicious external IP addresses.

Detection & Response

  • Log Analysis: Review Tomcat access logs (localhost_access_log.txt) and manager logs (manager.*.log) for successful authentications to the /manager/html interface from unexpected IP ranges. Look for PUT requests for .war files.
  • File Integrity Monitoring (FIM): Implement FIM on critical system scripts, particularly /home/kos/kbox/src/installation/distribution/convert_hosts.sh, to detect unauthorized modifications.
  • Network Monitoring: Monitor all network traffic to and from Dell RecoverPoint appliances. Since these are typically internal-facing, any direct communication with external IP addresses should be considered highly suspicious and investigated immediately. Reference D3FEND technique D3-NTA - Network Traffic Analysis.
  • Endpoint Detection and Response (EDR): If possible, deploy EDR agents on the underlying OS of the appliance to monitor for suspicious process execution, such as a java process spawning a shell.

Mitigation

  • Patch Immediately: The most critical action is to apply the security update provided by Dell to remediate CVE-2026-22769. D3FEND refers to this as D3-SU - Software Update.
  • Network Segmentation: Restrict network access to the Dell RecoverPoint management interface. It should only be accessible from a dedicated management subnet or specific trusted administrative hosts. Do not expose this interface to the internet. This aligns with D3FEND's D3-NI - Network Isolation.
  • Credential Management: Audit all infrastructure appliances for default or hard-coded credentials. Implement policies to change default passwords upon deployment. This is a form of D3FEND's D3-ACH - Application Configuration Hardening.
  • Assume Compromise: Given the long duration of this campaign, organizations with vulnerable, internet-exposed appliances should assume they are compromised and initiate incident response procedures, including hunting for the GRIMBOLT and SLAYSTYLE malware.

Timeline of Events

1
June 1, 2024
UNC6201 campaign exploiting CVE-2026-22769 begins (estimated start).
2
September 1, 2025
UNC6201 shifts tactics, replacing the BRICKSTORM backdoor with the new GRIMBOLT backdoor.
3
February 17, 2026
Dell releases a security advisory and patch for CVE-2026-22769.
4
February 18, 2026
Mandiant and Google Threat Intelligence Group publish joint research on the UNC6201 campaign.
5
February 18, 2026
This article was published

Article Updates

February 20, 2026

CISA adds Dell RecoverPoint zero-day (CVE-2026-22769) to KEV catalog, mandating urgent patching. UNC6201 campaign now targeting North American organizations, utilizing BRICKSTORM data stealer.

February 27, 2026

Dell RecoverPoint zero-day (CVE-2026-22769) added to CISA's KEV catalog, highlighting active exploitation and urging immediate patching.

MITRE ATT&CK Mitigations

Apply the patch from Dell immediately to fix the underlying vulnerability.

Mapped D3FEND Techniques:

Restrict access to the appliance's management interface to prevent unauthorized users from reaching the vulnerable service.

Mapped D3FEND Techniques:

Implement processes to change default credentials on all network devices and applications upon deployment.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Routinely audit access logs for management interfaces to detect anomalous login patterns or suspicious activity.

Use endpoint security solutions to detect and block known malware like web shells and backdoors.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The primary and most effective countermeasure is to immediately apply the security update for Dell RecoverPoint for Virtual Machines (version 6.0.3.1 HF1 or later) that remediates CVE-2026-22769. This action directly closes the initial access vector used by UNC6201. Organizations should prioritize patching internet-facing appliances first, followed by internal ones. A robust patch management program should be in place to ensure such critical updates are deployed within a strict, risk-based timeline. Post-patch, it is crucial to verify the update was successful across all appliances. Given the active exploitation, this is not a routine update; it is an emergency change that should be fast-tracked through change management processes.

As a critical compensating control, organizations must enforce strict network isolation for the Dell RecoverPoint management interfaces. These interfaces should never be exposed directly to the internet. Access should be restricted using firewall rules to a dedicated and secured management VLAN or specific jump-box IP addresses. This prevents external attackers from reaching the vulnerable Tomcat service. For internal segmentation, ensure that only necessary administrative systems can communicate with the appliance's management ports. This greatly reduces the attack surface and contains the threat, even if other parts of the network are compromised. This directly counters the initial access phase of the attack chain.

Deploy network traffic analysis solutions to monitor all inbound and outbound connections from Dell RecoverPoint appliances. Establish a baseline of normal traffic patterns. Since these appliances should have very predictable communication channels (e.g., to ESXi hosts, vCenter, and other RecoverPoint appliances), any deviation is highly suspicious. Specifically, create alerts for: 1) Inbound connections to the Tomcat management port from any IP outside the defined management subnet. 2) Any outbound connection from the appliance to an external IP address, which could indicate C2 communication from GRIMBOLT or another backdoor. This continuous monitoring is vital for detecting post-compromise activity if a patch cannot be immediately applied or if the system was already compromised.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Zero-DayAPTCyberespionageDellVMwareBackdoorHard-coded CredentialsCVE-2026-22769

📢 Share This Article

Help others stay informed about cybersecurity threats