Backdoor in Backup: UNC6201 Exploits RecoverPoint Zero-Day to Deploy GRIMBOLT

  • Post author:
  • Reading time:6 mins read

Executive Summary

A critical zero-day vulnerability in Dell RecoverPoint for Virtual Machines, tracked as CVE-2026-22769, has been actively exploited by the China-nexus threat cluster UNC6201 to deploy persistent backdoors and maintain covert access to enterprise infrastructure. The vulnerability stems from hard-coded administrative credentials stored in the Apache Tomcat configuration, allowing attackers to authenticate to the Tomcat Manager interface and deploy malicious WAR archives. UNC6201 leveraged this access to deploy multiple malware families, including the SLAYSTYLE web shell, BRICKSTORM backdoor, and the GRIMBOLT persistent backdoor.

Attackers established persistence by modifying internal RecoverPoint system scripts responsible for host configuration, ensuring malware execution during system operations. They also redirected network traffic using iptables-based covert channels and created temporary network interfaces to pivot into internal infrastructure. Because RecoverPoint appliances operate with elevated privileges and integrate directly with enterprise disaster recovery and VMware environments, exploitation enables long-term stealth access, infrastructure monitoring, and strategic enterprise compromise.


Background on UNC6201

UNC6201 is a China-nexus advanced persistent threat (APT) cluster known for targeting enterprise infrastructure appliances, particularly systems involved in backup, disaster recovery, and virtualization management. Their operations prioritize stealth persistence, covert access, and long-term espionage through the compromise of high-value infrastructure.

In this campaign, UNC6201 deployed multiple malware families to maintain access and evade detection:

SLAYSTYLE
A malicious WAR-based web shell deployed through the Apache Tomcat Manager interface, allowing persistent remote command execution on compromised RecoverPoint appliances.

BRICKSTORM
A Go-based backdoor designed to provide persistent access, execute attacker commands, and maintain remote control over infected systems.

GRIMBOLT
A C#-based persistent backdoor compiled using Native Ahead-of-Time (AOT) compilation and packed with UPX. GRIMBOLT enables long-term persistence, remote command execution, and command-and-control communication over WebSocket connections.

By compromising RecoverPoint appliances, UNC6201 gains privileged access to infrastructure connected to enterprise storage systems, VMware ESXi hosts, and disaster recovery environments.


Vulnerability Details

CVE-ID: CVE-2026-22769
CVSS Score: 10.0 (Critical severity)
Vulnerability Type: Use of Hard-coded Credentials (CWE-798)
Affected Software: Dell RecoverPoint for Virtual Machines versions prior to 6.0.3.1 HF1
Patched in: Dell RecoverPoint for Virtual Machines 6.0.3.1 HF1

The vulnerability is caused by hard-coded administrative credentials stored in the Apache Tomcat user configuration file:

/home/kos/tomcat9/conf/tomcat-users.xml

These credentials allow attackers to authenticate to the Apache Tomcat Manager interface:

/manager/text/deploy

Attackers used this interface to upload malicious WAR archives containing web shells.

Observed malicious deployment request:

PUT /manager/text/deploy?path=/slaystyle&update=true

Uploaded WAR files were deployed to the following Tomcat directories:

/var/lib/tomcat9
/var/cache/tomcat9/Catalina

These malicious WAR archives enabled attackers to execute arbitrary code through the Tomcat service, establishing persistent remote access.


Infection Method

The UNC6201 attack leveraging CVE-2026-22769 follows this chain:

UNC6201 operated within compromised enterprise environments and identified exposed Dell RecoverPoint appliances running Apache Tomcat. Attackers extracted hard-coded credentials from /home/kos/tomcat9/conf/tomcat-users.xml. These credentials allowed authentication to /manager/text/deploy.

With the command ‘PUT /manager/text/deploy?path=/slaystyle&update=true’, attackers deployed the SLAYSTYLE web shell into /var/lib/tomcat9 and /var/cache/tomcat9/Catalina, along with additional persistent malware: the BRICKSTORM backdoor and the GRIMBOLT persistent backdoor.

Attackers modified the RecoverPoint system script /home/kos/kbox/src/installation/distribution/convert_hosts.sh, which executes during system operations, ensuring persistent malware execution. They then implemented traffic redirection using iptables rules such as:

iptables -I INPUT -i eth0 -p tcp --dport 443 -m string --hex-string <HEX_PATTERN>
iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 443 -j REDIRECT --to-ports 10443

This enabled covert access using Single Packet Authorization (SPA) techniques.

UNC6201 created temporary network interfaces to pivot into internal infrastructure and communicate with additional enterprise systems. GRIMBOLT established WebSocket-based C2 communications:

149.248.11.71
wss://149.248.11.71/rest/apisession

Malware Behavior and Capabilities

UNC6201 deployed multiple malware families providing persistence, stealth, and remote control capabilities:

Persistent Web Shell Access (SLAYSTYLE): Allows attackers to execute commands through malicious Tomcat web application deployment.

Persistent Backdoor Access (GRIMBOLT):

  • Remote shell access
  • Persistent command execution
  • WebSocket-based command-and-control communication
  • Long-term stealth persistence

Compiled using Native AOT and packed with UPX for evasion.

Initial Backdoor Access (BRICKSTORM):

  • Remote command execution
  • Persistent system access
  • Infrastructure reconnaissance

Techniques Include (MITRE ATT&CK Mapping)

T1078 – Valid Accounts
Authentication using hard-coded credentials stored in the Tomcat configuration file to access the Tomcat Manager interface.

T1505.003 – Server Software Component: Web Shell
Deployment of the SLAYSTYLE web shell via malicious WAR archive uploaded through the Tomcat Manager deployment endpoint.

T1105 – Ingress Tool Transfer
Transfer and deployment of BRICKSTORM and GRIMBOLT backdoor payloads to the compromised RecoverPoint appliance.

T1059 – Command and Scripting Interpreter
Execution of attacker-controlled commands via the deployed SLAYSTYLE web shell and persistent backdoors.

T1547.004 – Boot or Logon Initialization Scripts: RC Scripts
Persistence established by modifying the RecoverPoint system script to execute malicious backdoor components at system startup.

T1562 – Impair Defenses
Use of iptables traffic redirection rules to conceal malicious access channels and evade detection.

T1572 – Protocol Tunneling
Redirection of inbound network traffic via iptables to attacker-controlled ports for covert remote access.

T1021 – Remote Services
Use of network services and temporary interfaces to enable lateral movement and remote command execution.

T1071.001 – Application Layer Protocol: Web Protocols
Command-and-control communication using WebSocket connections over HTTPS to attacker infrastructure.


Visual: UNC6201 RecoverPoint Attack Flow

[Initial Enterprise Compromise]
-> [Discovery of RecoverPoint Appliance]
-> [Extraction of Hard-coded Tomcat Credentials]
-> [Authentication to Tomcat Manager Interface]
-> [Deployment of SLAYSTYLE Web Shell]
-> [Command Execution on RecoverPoint Appliance]
-> [Deployment of BRICKSTORM Backdoor]
-> [Deployment of GRIMBOLT Persistent Backdoor]
-> [Persistence via convert_hosts.sh Script Modification]
-> [iptables Traffic Redirection and Covert Access]
-> [Temporary Network Interface Creation for Internal Pivoting]
-> [Command and Control Communication via WebSocket]

This flow demonstrates how UNC6201 leveraged hard-coded credentials to deploy persistent backdoors and maintain covert infrastructure access.


IOCs (Indicators of Compromise)

Command and Control Infrastructure

149.248.11.71
wss://149.248.11.71/rest/apisession

Malware Families, File Names and SHA-256

GRIMBOLT support24a11a26a2586f4fba7bfe89df2e21a0809ad85069e442da98c37c4add369a0c
GRIMBOLTout_elf_2dfb37247d12351ef9708cb6631ce2d7017897503657c6b882a711c0da8a9a591
SLAYSTYLEdefault_jsp.java92fb4ad6dee9362d0596fda7bbcfe1ba353f812ea801d1870e37bfc6376e624a
BRICKSTORMN/Aaa688682d44f0c6b0ed7f30b981a609100107f2d414a3a6e5808671b112d1878
BRICKSTORMsplisten2388ed7aee0b6b392778e8f9e98871c06499f476c9e7eae6ca0916f827fe65df
BRICKSTORMN/A320a0b5d4900697e125cebb5ff03dee7368f8f087db1c1570b0b62f5a986d759
BRICKSTORMN/A90b760ed1d0dcb3ef0f2b6d6195c9d852bcb65eca293578982a8c4b64f51b035
BRICKSTORMN/A45313a6745803a7f57ff35f5397fdf117eaec008a76417e6e2ac8a6280f7d830

Suspicious File Locations

/home/kos/tomcat9/conf/tomcat-users.xml
/var/lib/tomcat9
/var/cache/tomcat9/Catalina
/home/kos/kbox/src/installation/distribution/convert_hosts.sh

Suspicious Commands

PUT /manager/text/deploy?path=/slaystyle&update=true
iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 443 -j REDIRECT --to-ports 10443

Mitigation Steps

  • Apply Security Updates: Update Dell RecoverPoint for Virtual Machines to 6.0.3.1 HF1 or higher.
  • /home/kos/tomcat9/conf/tomcat-users.xml should be reviewed for unauthorized access or credential exposure.
  • Inspect deployment directories /var/lib/tomcat9 and /var/cache/tomcat9/Catalina
  • Review /home/kos/kbox/src/installation/distribution/convert_hosts.sh for unauthorized modifications.
  • Monitor Network Communications: Investigate suspicious outbound connections, especially WebSocket traffic.
  • Search for indicators related to SLAYSTYLE, BRICKSTORM, and GRIMBOLT malware.

Instantly Fix Risks with Saner Patch Management

Saner patch management is a continuous, automated, and integrated software that instantly fixes risks exploited in the wild. The software supports major operating systems like Windows, Linux, and macOS, as well as 550+ third-party applications.

It also allows you to set up a safe testing area to test patches before deploying them in a primary production environment. Saner patch management additionally supports a patch rollback feature in case of patch failure or a system malfunction.

Experience the fastest and most accurate patching software here.