ForensicsS | Private Detective & Digital Forensics Investigation Experts
  • info@forensicss.com

    Send Email

  • 11400 West Olympic Blvd, Los Angeles, CA 90064

  • Home
  • About Us
  • Services
    • Domestic Investigation
      • Los Angeles Private Eye
      • Catch Cheater
      • Infidelity Investigations
      • Asset Investigations
      • Private Detective Orange County
      • Child Custody Investigations
      • Missing Person Locates
      • Wire Fraud
      • Corporate Security Investigations
      • Surveillance Operations
      • Financial Fraud Investigations
      • Bug Sweep TSCM Investigation
      • Workers Compensation Fraud Investigation
      • Asset and Hidden Finances Investigations
    • Cyber Security
      • DIGITAL EVIDENCE AUTHENTICATION
      • Cyber Bullying Online Investigation
      • Penetration Testing Service
      • Social Media Monitoring
      • Romance Scam Investigator
      • Cyber Stalking Investigation
      • Crypto Scam Investigation
      • Cyber Security Assessment
      • Cyber Harassment Online Investigator
      • Ransomware Attack Investigation
      • Social Media Investigator
      • Extortion Investigation services
      • Background Screening
      • Insurance Fraud Detective
      • Forensic Accounting
      • Online Identity Theft
      • Online Blackmail
      • Cell Phone Forensics
      • Automotive Forensics
      • Audio Video Forensics
      • E-Discovery
      • Assets Search 
      • Computer and Cell Phone Forensics
  • Closed Cases
    • Closed Cases
    • Case Details
  • News
  • Contact
310-270-0598

Confidentiality Guaranteed

310-270-0598

Confidentiality Guaranteed

Logo

Contact Info

  • 11400 West Olympic Blvd, Los Angeles, CA 90064
  • 310-270-0598
  • info@forensicss.com

    Blog Details

      ForensicsS | Private Detective & Digital Forensics Investigation Experts > News > Uncategorized > Chinese hackers exploiting Dell zero-day flaw since mid-2024
    Chinese hackers exploiting Dell zero-day flaw since mid-2024
    17
    Feb
    • ForensicsS
    • 0 Comments

    Chinese hackers exploiting Dell zero-day flaw since mid-2024

    OSINT

    OSINT Dell

    A suspected Chinese mutter-backed hacking crew has been quietly exploiting a crucial Dell security flaw in zero-day assaults that started in mid-2024.

    Security researchers from Mandiant and the Google Threat Intelligence Crew (GTIG) printed on the present time that the UNC6201 crew exploited a maximum-severity hardcoded-credential vulnerability (tracked as CVE-2026-22769) in Dell RecoverPoint for Digital Machines, an answer ancient for VMware digital machine backup and restoration.

    “Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability,” Dell explains in a security advisory printed on Tuesday.

    OSINT Wiz

    “This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgrade or apply one of the remediations as soon as possible.”

    As soon as within a victim’s network, UNC6201 deployed quite loads of malware payloads, along with newly acknowledged backdoor malware known as Grimbolt. Written in C# and constructed the utilization of a relatively new compilation map, this malware is designed to be faster and more difficult to analyze than its predecessor, a backdoor known as Brickstorm.

    While the researchers possess noticed the crew swapping out Brickstorm for Grimbolt in September 2025, it remains unclear whether or no longer the change used to be a deliberate upgrade or “a reaction to incident response efforts led by Mandiant and other industry partners.”

    OSINT Focusing on VMware ESXi servers

    The attackers additionally ancient new suggestions to burrow deeper into victims’ virtualized infrastructure, along with increasing hidden network interfaces (so-known as Ghost NICs) on VMware ESXi servers to scoot stealthily across victims’ networks.

    “UNC6201 uses temporary virtual network ports (AKA “Ghost NICs”) to pivot from compromised VMs into internal or SaaS environments, a new technique that Mandiant has not observed before in their investigations,” Mandiant communications supervisor Mark Karayan told BleepingComputer.

    “Consistent with the earlier BRICKSTORM campaign, UNC6201 continues to target appliances that typically lack traditional endpoint detection and response (EDR) agents to remain undetected for long periods.”

    The researchers possess discovered overlaps between UNC6201 and a separate Chinese possibility cluster, UNC5221, identified for exploiting Ivanti zero-days to target authorities companies with personalized Spawnant and Zipline malware and beforehand linked to the infamous Silk Storm Chinese mutter-backed possibility crew (although the 2 are no longer regarded as because the same by GTIG).

    GTIG added in September that UNC5221 hackers ancient Brickstorm (first documented by Google subsidiary Mandiant in April 2024) to develop long-duration of time persistence on the networks of a pair of U.S. organizations within the approved and technology sectors, whereas CrowdStrike has linked Brickstorm malware assaults focusing on VMware vCenter servers of approved, technology, and manufacturing firms within the United States to a Chinese hacking crew it tracks as Warp Panda.

    To dam ongoing CVE-2026-22769 assaults, Dell customers are suggested to take a look on the remediation steering shared in this security advisory.


    OSINT tines

    OSINT The scheme forward for IT infrastructure is here

    Stylish IT infrastructure strikes faster than handbook workflows can take care of.

    On this new Tines handbook, learn how your team can within the reduction of hidden handbook delays, pork up reliability through computerized response, and build and scale wise workflows on top of instruments you already insist.

    Read More

    • Tags

    • Chinese cybercrime email-fraud forensics|digital-forensics hacker hackers Investigation malware online-scam private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker

    Recent Posts

    • Gun retailer proprietor says FBI requested him to verify firearm gross sales against listing of names, pics in Guthrie case
    • Chinese hackers exploiting Dell zero-day flaw since mid-2024
    • Key NIH overview institute told to rob away references to ‘pandemic preparedness’
    • Gabriel Basso, Netflix’s No longer-So-Secret ‘Agent’ Man
    • Update Chrome ASAP! The first zero-day flaw of 2026 is patched

    Recent Comments

    No comments to show.

    Categories

    • cybersecurity
    • Investigations
    • Uncategorized

    Recent Posts

    Gun retailer proprietor says FBI requested him to verify firearm gross sales against listing of names, pics in Guthrie case
    February 17, 2026
    Gun retailer proprietor says FBI requested him to verify firearm gross sales against listing of names, pics in Guthrie case
    Chinese hackers exploiting Dell zero-day flaw since mid-2024
    February 17, 2026
    Chinese hackers exploiting Dell zero-day flaw since mid-2024
    Key NIH overview institute told to rob away references to ‘pandemic preparedness’
    February 17, 2026
    Key NIH overview institute told to rob away references to ‘pandemic preparedness’

    Popular Tags

    administration calls Crypto Cyber cybercrime cybercrimefraud cybercrimehacker cybercrimephishing-attack cybersecurity Department digital-forensics email-fraud Epstein FBI’s forensics|digital-forensics Former fraud hacker hackers investigating Investigation investigationcybersecurity Justice Korean Launches malware malwarefraud malwarephishing-attack Microsoft Minnesota North online-scam online-scamphishing-attack Patel phishing-attack Police private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker probe Trump Trump’s warns

    Forensics – Trusted Experts in Surveillance, Cyber Security, Background Checks, and Digital Forensics across California.

    • 310-270-0598
    • info@forensicss.com
    • 11400 West Olympic Blvd, Los Angeles, CA 90064

    Explore

    • News
    • About
    • Our Services
    • Find A Person
    • Child Custody
    • Contact Us
    • Los Angeles
    • Orange County
    • San Diego

    Services

    • Cyber Security
    • Online Blackmail
    • Cell Phone Forensics
    • Domestic Investigation
    • Social Media Investigator
    • Crypto Scam Investigation

    Newsletter

    Sign up email to get our daily latest news & updates from us

    © Copyright 2021 by KRIGO