Mandiant and Google Threat Intelligence Group (GTIG) have released critical findings regarding UNC6201, a suspected PRC-nexus threat cluster. This group has been actively exploiting a Dell RecoverPoint for Virtual Machines (RP4VM) zero-day, tracked as CVE-2026-22769 (CVSS v3.1 10.0), since at least mid-2024. The exploitation allows UNC6201 to establish footholds on edge and appliance infrastructure, move laterally, and deploy various payloads, including the SLAYSTYLE web shell, the BRICKSTORM backdoor, and its newly identified successor, GRIMBOLT 1.
The inclusion of CVE-2026-22769 in CISA’s Known Exploited Vulnerabilities (KEV) catalog highlights the urgent need for patching. However, the more significant insight is UNC6201’s strategic modernization of its tools and pivoting techniques, specifically targeting VMware-adjacent infrastructure, which often lacks standard Endpoint Detection and Response (EDR) coverage 1.
1. Executive Summary
- What happened: UNC6201 exploited a hardcoded-credential vulnerability in Dell RP4VM (CVE-2026-22769) to gain privileged access, deploy web shells and backdoors, and maintain persistence across victim environments 1.
- Why it matters: RP4VM is commonly deployed in VMware-centric environments for backup and recovery. Its compromise can create a durable access point close to high-value virtual infrastructure and management planes 1.
- What’s new: Mandiant observed BRICKSTORM binaries being replaced by GRIMBOLT in September 2025. GRIMBOLT utilizes .NET Native AOT compilation and UPX packing to complicate analysis and improve performance on constrained appliances 1.
- Immediate action: Apply Dell’s remediation guidance for affected versions. Treat exposed or internet-reachable management interfaces as high-risk and hunt for Tomcat Manager deployment artifacts 1.
2. Contextual Background
2.1 Nature of the Threat (CVE-2026-22769)
CVE-2026-22769 is a hardcoded credential vulnerability affecting Dell RecoverPoint for Virtual Machines (versions prior to 6.0.3.1 HF1). An unauthenticated attacker with knowledge of the credential can obtain unauthorized OS access and root-level persistence. Dell’s advisory provides remediation pathways and upgrade guidance for impacted 5.x and 6.x branches 1.
References:
2.2 Threat-Actor Attribution and Overlaps
Mandiant and GTIG track this activity as UNC6201, assessed as a suspected PRC-nexus cluster. While some public reporting uses “Silk Typhoon” synonymously with UNC5221, GTIG currently does not consider UNC6201 and UNC5221 to be the same entity 1.
Attribution confidence: Likely (B2), based on incident-response observations and consistent tooling/TTPs, despite limited public victim-level telemetry 1.
2.3 Why Appliances and VMware-Adjacent Tooling are Attractive
UNC6201’s focus on edge/appliance tradecraft aligns with a broader trend of attackers targeting systems that often lack full endpoint visibility and reside on trusted network segments. Mandiant’s report highlights novel VMware pivot techniques (e.g., “Ghost NICs”) and iptables-based Single Packet Authorization (SPA), indicating an intent to quietly pivot into internal and SaaS environments while minimizing detection opportunities 1.
3. Technical Analysis
3.1 Exploitation Workflow (as observed by Mandiant/GTIG)
Mandiant discovered CVE-2026-22769 during investigations where RP4VM appliances showed active C2 linked to BRICKSTORM/GRIMBOLT. Analysts identified the following steps:
- Pre-compromise web requests to the RP4VM appliance using the username
admin. - Interaction with Apache Tomcat Manager, which RP4VM uses to deploy software components.
- Deployment of a malicious WAR containing the SLAYSTYLE web shell via Tomcat Manager endpoints.
- Identification of hardcoded default credentials for the admin user in
/home/kos/tomcat9/tomcat-users.xml. - Using these credentials to authenticate to Tomcat Manager, upload malicious WARs via
/manager/text/deploy, and achieve command execution as root on the appliance 1.
3.2 GRIMBOLT: What Changed from BRICKSTORM?
Mandiant reports a September 2025 shift where UNC6201 replaced BRICKSTORM binaries with GRIMBOLT, signifying an evolution in operational reliability and resistance to reverse-engineering 1:
- Language/format: C#
- Compilation: Native AOT (Ahead-of-Time) compilation, introduced to .NET in 2022
- Packing: UPX
- Capability: Remote shell / foothold backdoor
- Infrastructure: Uses the same C2 as previously deployed BRICKSTORM 1
It remains unclear whether this swap was a planned lifecycle upgrade or a response to incident-response pressure 1.
3.3 Persistence on RP4VM Appliances
UNC6201 established persistence for BRICKSTORM/GRIMBOLT by modifying a legitimate script:
convert_hosts.shwas altered to include the backdoor path.- The script executes at boot via
rc.local1.
3.4 Newly Observed VMware Pivot Techniques
Two notable TTPs observed in the Mandiant write-up include:
- “Ghost NICs”: Creation of temporary network ports on existing VMs on ESXi, used as a stealthy pivot mechanism into internal and SaaS infrastructure 1.
- iptables proxying for SPA: Rules monitoring a specific hex string on port 443, temporarily permitting access (e.g., to 10443), and redirecting subsequent traffic for a limited time window 1.
4. Impact Assessment
4.1 Severity and Operational Risk
- CVSS: 10.0 (Critical) 1.
- Likely outcomes: Root-level persistence on an infrastructure appliance, durable foothold, stealthy lateral movement into VMware-managed environments and adjacent services, and potential for follow-on espionage or disruptive actions 1.
4.2 Likely Victim Profile
Environments with the highest risk are those where RP4VM appliances:
- Are reachable from untrusted networks (directly or via exposed management paths).
- Are managed as “infrastructure” without robust logging/EDR coverage.
- Have trust relationships into VMware management or backup networks 1.
5. Indicators of Compromise (IOCs)
The following IOCs are taken from the Mandiant/GTIG report. Validate them in context and do not treat them as exhaustive 1.
| Type | Value | Context/Notes | Source |
|---|---|---|---|
| SHA-256 | 24a11a26a2586f4fba7bfe89df2e21a0809ad85069e442da98c37c4add369a0c | GRIMBOLT (support) | Mandiant/GTIG: From BRICKSTORM to GRIMBOLT 1 |
| SHA-256 | dfb37247d12351ef9708cb6631ce2d7017897503657c6b882a711c0da8a9a591 | GRIMBOLT (out_elf_2) | Mandiant/GTIG: From BRICKSTORM to GRIMBOLT 1 |
| SHA-256 | 92fb4ad6dee9362d0596fda7bbcfe1ba353f812ea801d1870e37bfc6376e624a | SLAYSTYLE (default_jsp.java) | Mandiant/GTIG: From BRICKSTORM to GRIMBOLT 1 |
| SHA-256 | aa688682d44f0c6b0ed7f30b981a609100107f2d414a3a6e5808671b112d1878 | BRICKSTORM (filename N/A) | Mandiant/GTIG: From BRICKSTORM to GRIMBOLT 1 |
| SHA-256 | 2388ed7aee0b6b392778e8f9e98871c06499f476c9e7eae6ca0916f827fe65df | BRICKSTORM (splisten) | Mandiant/GTIG: From BRICKSTORM to GRIMBOLT 1 |
| SHA-256 | 320a0b5d4900697e125cebb5ff03dee7368f8f087db1c1570b0b62f5a986d759 | BRICKSTORM (filename N/A) | Mandiant/GTIG: From BRICKSTORM to GRIMBOLT 1 |
| SHA-256 | 90b760ed1d0dcb3ef0f2b6d6195c9d852bcb65eca293578982a8c4b64f51b035 | BRICKSTORM (filename N/A) | Mandiant/GTIG: From BRICKSTORM to GRIMBOLT 1 |
| SHA-256 | 45313a6745803a7f57ff35f5397fdf117eaec008a76417e6e2ac8a6280f7d830 | BRICKSTORM (filename N/A) | Mandiant/GTIG: From BRICKSTORM to GRIMBOLT 1 |
| C2 IP | 149.248.11.71 | GRIMBOLT C2 | Mandiant/GTIG: From BRICKSTORM to GRIMBOLT 1 |
| C2 Endpoint | wss://149.248.11.71/rest/apisession | GRIMBOLT WebSocket endpoint | Mandiant/GTIG: From BRICKSTORM to GRIMBOLT 1 |
5.2 Detection Guidance
Appliance/Tomcat-focused hunting (high signal in this case):
- Review Tomcat Manager audit logs for any requests to
/manager:/home/kos/auditlog/fapi_cl_audit_log.log1
- Treat the following as suspicious, particularly outside maintenance windows:
PUT /manager/text/deploy?path=/<MAL_PATH>&update=true1
- Hunt for WAR artifacts in:
/var/lib/tomcat9(uploaded WARs)/var/cache/tomcat9/Catalina(compiled artifacts)/var/log/tomcat9/(Tomcat logs; look forHostConfig.deployWARevents) 1
Persistence checks:
- Diff and integrity-check:
/home/kos/kbox/src/installation/distribution/convert_hosts.sh- Boot-time execution paths (e.g.,
rc.local) 1
Network checks:
- Alert on outbound WebSocket connections to untrusted IPs from RP4VM appliances 1.
- If you can log firewall/iptables changes on adjacent management appliances (e.g., vCenter), hunt for SPA-like rule patterns and short-lived allowlists consistent with Mandiant’s description 1.
YARA (as published by GTIG/Mandiant)
Use responsibly and test in a controlled pipeline before production deployment 1.
Plaintext
rule G_APT_BackdoorToehold_GRIMBOLT_1
{
meta:
author = "Google Threat Intelligence Group (GTIG)"
strings:
$s1 = { 40 00 00 00 41 18 00 00 00 4B 21 20 C2 2C 08 23 02 }
$s2 = { B3 C3 BB 41 0D ?? ?? ?? 00 81 02 0C ?? ?? ?? 00 }
$s3 = { 39 08 01 49 30 A0 52 30 00 00 00 DB 40 09 00 02 00 80 65 BC 98 }
$s4 = { 2F 00 72 00 6F 00 75 00 74 00 65 79 23 E8 03 0E 00 00 00 2F 00 70 00 72 00 6F 00 63 00 2F 00 73 00 65 00 6C 00 66 00 2F 00 65 00 78 00 65 }
condition:
(uint32(0) == 0x464c457f) //linux
and all of ($s*)
}
rule G_Hunting_BackdoorToehold_GRIMBOLT_1
{
meta:
author = "Google Threat Intelligence Group (GTIG)"
strings:
$s1 = "[!] Error : Plexor is nul" ascii wide
$s2 = "port must within 0~6553" ascii wide
$s3 = "[*] Disposing.." ascii wide
$s4 = "[!] Connection error. Kill Pty" ascii wide
$s5 = "[!] Unkown message type" ascii wide
$s6 = "[!] Bad dat" ascii wide
condition:
(
(uint16(0) == 0x5a4d and uint32(uint32(0x3C)) == 0x00004550) or
uint32(0) == 0x464c457f or
uint32(0) == 0xfeedface or
uint32(0) == 0xcefaedfe or
uint32(0) == 0xfeedfacf or
uint32(0) == 0xcffaedfe or
uint32(0) == 0xcafebabe or
uint32(0) == 0xbebafeca or
uint32(0) == 0xcafebabf or
uint32(0) == 0xbfbafeca
) and any of them
}
rule G_APT_BackdoorWebshell_SLAYSTYLE_4
{
meta:
author = "Google Threat Intelligence Group (GTIG)"
strings:
$str1 = "<%@page import=\"java.io" ascii wide
$str2 = "Base64.getDecoder().decode(c.substring(1)" ascii wide
$str3 = "{\"/bin/sh\",\"-c\"" ascii wide
$str4 = "Runtime.getRuntime().exec(" ascii wide
$str5 = "ByteArrayOutputStream();" ascii wide
$str6 = ".printStackTrace(" ascii wide
condition:
$str1 at 0 and all of them
}
6. Incident Response Guidance
6.1 Containment, Eradication, Recovery
- Reduce exposure immediately: Restrict RP4VM management interfaces to trusted admin networks; block public access paths where possible 1.
- Apply Dell remediation guidance: Upgrade and/or mitigation steps depending on supported versions 1.
- If compromise is suspected: Treat the appliance as untrusted, preserve evidence, and consider rebuilding or restoring from a known-good image. Rotate credentials and re-issue secrets used by the appliance to access backups, vCenter, and adjacent systems 1.
- Validate VMware and management plane integrity: If RP4VM was compromised, prioritize reviewing connected VMware infrastructure for unauthorized changes consistent with pivot activity described by Mandiant (e.g., unusual vNIC/network port modifications) 1.
6.2 Forensic Artifacts to Collect and Preserve (RP4VM)
High-value sources (per Mandiant/GTIG):
/home/kos/auditlog/fapi_cl_audit_log.log(Tomcat Manager audit log; search for/manager) 1/var/lib/tomcat9(uploaded WARs) 1/var/cache/tomcat9/Catalina(compiled webapp artifacts) 1/var/log/tomcat9/(Tomcat and Catalina logs; huntdeployWARevents) 1/home/kos/kbox/src/installation/distribution/convert_hosts.shand boot execution artifacts (e.g.,rc.local) 1
6.3 Lessons Learned
- Appliance ecosystems remain a persistent visibility gap: Ensure central logging, immutable baselines, and change monitoring extend to “utility” systems (backup, DR, network management) 1.
- Treat VMware-adjacent tools as tier-0 assets: Compromise enables stealthy pivot routes that can bypass typical endpoint-centric controls 1.
7. Threat Intelligence Contextualization
7.1 How This Fits Broader PRC-Nexus Tradecraft Trends
The reported focus on appliance compromise, long dwell time (mid-2024 onward), and stealthy internal pivots aligns with common state-aligned objectives: durable access, low noise, and operational flexibility for intelligence collection. Mandiant’s emphasis on Native AOT in GRIMBOLT also suggests an intent to harden tooling against reverse engineering and signature-based detections 1.
7.2 Full MITRE ATT&CK Mapping (Observed Behaviors)
| Tactic | Technique ID | Technique Name | Observed Behavior |
|---|---|---|---|
| Initial Access | T1190 | Exploit Public-Facing Application | Exploitation path leveraged exposed Tomcat Manager functionality in appliance deployments 1. |
| Persistence | T1505.003 | Server Software Component: Web Shell | SLAYSTYLE web shell delivered via malicious WAR deployment 1. |
| Execution | T1059.004 | Unix Shell | Command execution as root on the appliance following WAR deployment 1. |
| Persistence | T1037.004 | Boot or Logon Initialization Scripts: RC Scripts | convert_hosts.sh modification executed at boot via rc.local 1. |
| Command and Control | T1071 | Application Layer Protocol | GRIMBOLT uses a WebSocket-based C2 endpoint 1. |
| Lateral Movement | T1021 | Remote Services | Report describes lateral movement and pivoting into VMware/adjacent infrastructure (specific mechanisms include Ghost NICs) 1. |
| Defense Evasion | T1562.004 | Impair Defenses: Disable or Modify System Firewall | iptables-based SPA/proxying behavior observed on management appliances during investigations 1. |
8. Mitigation Recommendations
8.1 Prioritized Hardening Actions
- Patch/remediate immediately according to Dell’s advisory guidance (including supported upgrade sequencing) 1.
- Restrict management access: Enforce allowlists for Tomcat Manager and administrative interfaces; remove direct internet exposure 1.
- Enable comprehensive logging: Forward RP4VM and VMware management logs to your SIEM; retain sufficient history to cover potential mid-2024 dwell time 1.
8.2 Patch Management and Exploitation Signals
- Treat this as actively exploited (CISA KEV listing is a strong external signal of exploitation in the wild) 1.
- Use the Dell advisory as the authoritative remediation source for affected versions:
9. Historical Context & Related Vulnerabilities
Mandiant frames this campaign as an evolution of previously reported BRICKSTORM espionage activity, now extended with GRIMBOLT and VMware-focused pivoting innovations. The overlap discussion with UNC5221 (“Silk Typhoon” in some public reporting) highlights the ongoing challenge of cluster delineation when infrastructure, tooling, or access methods converge across PRC-aligned operations 1.
10. Future Outlook
Expect UNC6201 (and similar clusters) to continue investing in:
- Appliance-resident malware optimized for constrained environments (e.g., Native AOT, reduced forensic artifacts) 1.
- Stealth pivot mechanisms inside virtual networks (e.g., ephemeral ports/interfaces) 1.
- Traffic gating and covert access controls (SPA-like patterns) to reduce detection and limit exposure 1.
11. Further Reading
Primary Sources
- Mandiant/GTIG: From BRICKSTORM to GRIMBOLT — UNC6201 exploiting Dell RP4VM zero-day 1
- Dell advisory for CVE-2026-22769 (DSA-2026-079) 1
- NVD 1
- CISA KEV catalogue entry 1
Secondary Coverage (Context and Summaries)
- Cybersecurity Dive summary of exploitation and tooling 1
- The Hacker News overview of CVE-2026-22769 and UNC6201 1
