Skip to main content
See every side of every news story
Published loading...Updated

Dell 0-day exploited by suspected Chinese snoops since 2024

A China-linked group exploited a critical Dell vulnerability since mid-2024 to deploy multiple backdoors, affecting fewer than a dozen organizations, researchers said.

  • On Tuesday, Dell Technologies disclosed and patched CVE-2026-22769, a hardcoded credential flaw exploited by suspected PRC-linked UNC6201 since mid-2024, Google Threat Intelligence Group and Mandiant reported.
  • GTIG and Mandiant found the attackers aim to backdoor machines for long-term access, targeting appliances without EDR to remain undetected over 400 days.
  • Technical telemetry reveals the use of Ghost NICs and the replacement of Brickstorm with Grimbolt in September 2025, while attackers exploited a hardcoded Apache Tomcat password to deploy a Slaystyle web shell and modified convert_hosts.sh for persistence.
  • The flaw carries a 10/10 severity score, and Dell is urging customers to implement mitigations immediately while CISA, NSA, and Canadian Centre for Cyber Security released guidance last week.
  • Analysts warn the actor is likely still active in unpatched and remediated environments, and Mandiant discovered the vulnerability while investigating a backdoored victim environment with less than a dozen known impacted organizations.
Insights by Ground AI

12 Articles

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 100% of the sources are Center
100% Center

Factuality Info Icon

To view factuality data please Upgrade to Premium

Ownership

Info Icon

To view ownership data please Upgrade to Vantage

BleepingComputer broke the news in on Tuesday, February 17, 2026.
Too Big Arrow Icon
Sources are mostly out of (0)

Similar News Topics

News
Feed Dots Icon
For You
Search Icon
Search
Blindspot LogoBlindspotLocal