UNC6201 Exploits Dell RecoverPoint Zero-Day

Thought BRICKSTORM was the worst? UNC6201 just leveled up to GRIMBOLT on Dell's RecoverPoint zero-day. Your virtual machines are in the crosshairs.

UNC6201's Dell RecoverPoint Zero-Day: BRICKSTORM Dies, GRIMBOLT Rises — theAIcatchup

Key Takeaways

  • UNC6201 exploited Dell RecoverPoint zero-day CVE-2026-22769 since mid-2024 for lateral movement and persistence.
  • Swapped BRICKSTORM for evasive GRIMBOLT malware, using native AOT compilation to thwart analysis.
  • New TTPs include Ghost NICs and iptables SPA for VMware pivoting, signaling deeper virtual infra threats.

Everyone figured UNC6201 would stick to the usual – phishing edge devices, dropping basic backdoors. Lazy stuff. But no. These PRC-linked pros cracked a perfect 10.0 CVSS zero-day in Dell RecoverPoint for Virtual Machines. CVE-2026-22769. Mid-2024. That’s when the party started.

This changes everything. Lateral movement in virtualized environments? Suddenly trivial. Persistence? Ironclad. And Dell? Still shipping hard-coded admin creds like it’s 1999.

What the Hell is RecoverPoint Anyway?

Dell RecoverPoint. Fancy replication tech for VMs. Keeps your data mirrored across sites. Critical for disaster recovery – or, in this case, hacker playgrounds. UNC6201 spotted the Tomcat Manager flaw. Default creds in tomcat-users.xml. Admin login. Boom – upload malicious WAR, drop SLAYSTYLE webshell, own the box as root.

Mandiant discovered CVE-2026-22769 while investigating multiple Dell RecoverPoint for Virtual Machines within a victim’s environment that had active C2 associated with BRICKSTORM and GRIMBOLT backdoors.

Pathetic. Hard-coded creds? In enterprise gear? Dell, fix your shit.

Short version: Attackers hit /manager/text/deploy. Deploy shell. Escalate. Game over.

And here’s my hot take – this ain’t random. Remember Salt Typhoon’s telecom rampage last year? Same playbook: burrow into infra, ghost around. UNC6201’s just extending it to storage appliances. Prediction: VMware farms get hammered next. Twice as many ghosts by 2026.

BRICKSTORM to GRIMBOLT: The Malware Glow-Up

BRICKSTORM. Old reliable. But September 2025? Poof. Replaced by GRIMBOLT. C# beast, native AOT-compiled. No JIT nonsense. Packs UPX for extra obfuscation. Runs like a dream on starved appliances – no bloat, no metadata for RE tools to chew on.

Why switch? Mandiant poked the bear, maybe. Or evolution. GRIMBOLT hands over a remote shell, same C2 as big bro. Persistence? Hijack convert_hosts.sh, fired at boot via rc.local. Sneaky.

Unlike traditional .NET software that uses just-in-time (JIT) compilation at runtime, Native AOT-compiled binaries, introduced to .NET in 2022, are converted directly to machine-native code during compilation.

Smart. Complicates life for defenders. Static analysis? Good luck.

But let’s call bullshit on the PR spin. Dell’s advisory? Buried in jargon. Customers urged to ‘follow guidance.’ Yeah, no kidding. This was brewing for a year before patch.

Ghost NICs and iptables Shenanigans

Not content with Dell boxes. UNC6201 pivots to VMware. New tricks: ‘Ghost NICs.’ Fake network interfaces for stealthy hops. iptables for Single Packet Authorization. SPA? Think port-knocking on steroids – only authorized packets slip through.

Overlaps with UNC5221 (Silk Typhoon vibes, but GTIG says nah, separate). Either way, virtual infra’s the new frontier. Edge appliances were table stakes. Now they’re tunneling into your core VMs.

Look. Overlaps scream coordination. PRC nexus doesn’t do solo acts.

This sprawls into a nightmare: Compromise RecoverPoint → webshell → BRICKSTORM/GRIMBOLT → VMware pivot → full domain dom. Detection? Hunt web requests to Tomcat Manager. Anomalous WAR deploys. C2 to known UNC6201 infra.

Why Does Dell Get a Pass?

Hard-coded creds. In 2024? Come on. Tomcat Manager wide open. Admin username, guessable password. It’s like leaving your safe ajar with the combo taped inside.

Dell patched it. Good. But urgency? Lacking. Mandiant and GTIG handed this on a platter after IR gigs. Exploitation since mid-2024. Victims? Probably critical sectors – finance, gov, you name it.

My insight: This mirrors Shadow Brokers’ EternalBlue drop. Zero-days in trusted vendors erode trust fast. Dell’s rep takes a hit; enterprises rethink RecoverPoint. Shift to air-gapped replicas? Maybe.

Hardening tips – cuz Mandiant’s got ‘em. Disable Tomcat Manager if unused. Rotate creds yesterday. Monitor boot scripts. YARA for GRIMBOLT artifacts.

But here’s the dry humor: If your RecoverPoint’s still default-config, congrats – you’re patient zero for the sequel.

Is Your VMware Setup Next?

Yes. Mandiant saw continued VMware hits. CrowdStrike, CISA echoes. New TTPs confirm it. Ghost NICs? Genius for evasion. iptables SPA blocks scanners cold.

Question everyone’s expecting: UNC6201 vs. UNC5221? GTIG splits hairs, but TTPs scream family reunion. PRC’s got layers.

Bold call – expect GRIMBOLT variants in Hyper-V, Nutanix next. Virtualization’s the soft underbelly. Patch stacks or pray.

Actionable? IOCs in the Mandiant post. C2 domains. Hashes. Hunt ‘em.

Victims scrambling. IR firms billing hours. Dell issuing urgent advisories. Theater.


🧬 Related Insights

Frequently Asked Questions

What is CVE-2026-22769?

Zero-day in Dell RecoverPoint for VMs. CVSS 10.0. Allows root via Tomcat Manager creds. Exploited mid-2024.

How does GRIMBOLT differ from BRICKSTORM?

GRIMBOLT’s C# AOT-compiled, UPX-packed. Faster, stealthier on appliances. Same C2, remote shell. Persistence via boot scripts.

Is Dell RecoverPoint safe after the patch?

Patched, yes. But check configs – no defaults. Monitor for ghosts. VMware pivots still a risk.

Priya Sundaram
Written by

Hardware and infrastructure reporter. Tracks GPU wars, chip design, and the compute economy.

Frequently asked questions

What is CVE-2026-22769?
Zero-day in Dell RecoverPoint for VMs. CVSS 10.0. Allows root via Tomcat Manager creds. Exploited mid-2024.
How does GRIMBOLT differ from BRICKSTORM?
GRIMBOLT's C# AOT-compiled, UPX-packed. Faster, stealthier on appliances. Same C2, remote shell. Persistence via boot scripts.
Is Dell RecoverPoint safe after the patch?
Patched, yes. But check configs – no defaults. Monitor for ghosts. VMware pivots still a risk.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Mandiant Blog

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.