HomeNewsChinese language hackers exploited zero-day Dell RecoverPoint flaw for 1.5 years

Chinese language hackers exploited zero-day Dell RecoverPoint flaw for 1.5 years

Dell RecoverPoint for Digital Machines is an information replication and safety equipment for VMware environments, which makes it a horny goal for this group. The brand new vulnerability impacts variations 5.3 SP4 P1, 6.0, 6.0 SP1, 6.0 SP1 P1, 6.0 SP1 P2, 6.0 SP2, 6.0 SP2 P1, 6.0 SP3, and 6.0 SP3 P1. Clients are strongly inspired to improve to the patched 6.0.3.1 HF1 model, but when that’s not instantly doable Dell additionally launched a remediation script.

Attackers improve from BRICKSTORM to GRIMBOLT

UNC6201’s actions overlap considerably with one other group that Mandiant and Google’s Risk Intelligence Group (GTIG) observe as UNC5221, which is thought for concentrating on network-edge home equipment utilizing zero-day exploits. Different security firms attribute this exercise to the Chinese language state-sponsored hacker group Silk Storm or APT27, however Google believes this to be a unique menace actor.

UNC5221 has compromised the networks of US authorized providers corporations, SaaS suppliers, enterprise course of outsourcers, and know-how firms over the previous few years and deployed Linux backdoor BRICKSTORM and an internet shell known as SLAYSTYLE that has been put in on compromised vCenter deployments.

See also  US might plan laws to include Chinese language cyber espionage
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular