Chinese Hackers Exploit Dell Zero-Day for 18 Months; Three New ICS Threat Groups Emerge as Ransomware Hits Industrial Operations
Critical Infrastructure Intelligence Briefing
Report Date: Wednesday, February 18, 2026
Reporting Period: February 11-18, 2026
1. Executive Summary
This week's intelligence reveals significant escalation in threats to critical infrastructure, with Chinese state-sponsored actors exploiting a Dell zero-day vulnerability undetected for 18 months, and industrial cybersecurity firm Dragos identifying three new threat groups targeting ICS/OT environments. Key developments include:
- Nation-State Activity: Google researchers disclosed that Chinese threat group UNC6201 has been exploiting a Dell RecoverPoint for Virtual Machines zero-day since mid-2024, deploying advanced "Grimbolt" malware—an evolution of the Brickstorm backdoor. This represents a significant intelligence failure in detection capabilities.
- ICS/OT Threat Expansion: Dragos's 9th Annual Year in Review report identifies three new threat groups that began targeting industrial control systems in 2025, with ransomware attacks causing increased operational disruption across industrial environments.
- Identity-Based Attacks Surge: Palo Alto Networks' Unit 42 reports that nearly two-thirds of breaches now originate from identity abuse, highlighting critical gaps in access controls across integrated enterprise systems.
- Ransomware Enforcement: Polish authorities arrested a 47-year-old suspect linked to the Phobos ransomware operation, seizing devices containing stolen credentials and credit card data.
- Regulatory Development: CISA is actively seeking industry input on the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA), presenting an important opportunity for infrastructure operators to shape reporting requirements.
- AI Security Concerns: Multiple reports highlight emerging risks from AI systems, including research showing AI assistants can be weaponized as command-and-control proxies and internal AI copilots creating accidental data exposure pathways.
2. Threat Landscape
Nation-State Threat Actor Activities
Chinese APT Exploits Dell Zero-Day (UNC6201)
Google Mandiant researchers have disclosed that suspected Chinese state-backed threat group UNC6201 has been exploiting a critical zero-day vulnerability in Dell RecoverPoint for Virtual Machines since mid-2024—approximately 18 months before detection. Key findings include:
- Malware Evolution: Attackers have transitioned from the Brickstorm backdoor to a more advanced variant called "Grimbolt," indicating continued investment in capability development
- Target Profile: Virtual machine recovery infrastructure represents high-value targets for data exfiltration and potential disruption of disaster recovery capabilities
- Detection Gap: The extended dwell time highlights significant challenges in identifying sophisticated supply chain and infrastructure-level compromises
Source: CyberScoop, Bleeping Computer, Mandiant
New ICS/OT Threat Groups Identified
Dragos's annual OT/ICS Cybersecurity Report reveals three new threat groups began targeting industrial control systems in 2025. While specific group designations were not detailed in available reporting, this expansion indicates growing adversary interest in operational technology environments across critical infrastructure sectors.
Source: SecurityWeek
Ransomware and Cybercriminal Developments
Phobos Ransomware Affiliate Arrested
Polish authorities arrested a 47-year-old man suspected of involvement with the Phobos ransomware operation. Law enforcement seized computers and mobile devices containing:
- Stolen credentials
- Credit card numbers
- Server access information
- Evidence of cybercrime tool production and distribution
The suspect faces up to five years imprisonment for producing, obtaining, and sharing computer programs used in cyberattacks.
Source: CyberScoop, SecurityWeek
Industrial Ransomware Surge
Dragos reports a significant rise in ransomware attacks specifically targeting industrial operations, with attacks increasingly causing operational disruption rather than just data theft. This trend represents elevated risk for manufacturing, energy, and utilities sectors.
Source: Infosecurity Magazine
Emerging Attack Vectors
AI Systems as Attack Infrastructure
Researchers have demonstrated that AI assistants supporting web browsing or URL fetching can be weaponized as stealthy command-and-control (C2) relays. Microsoft Copilot and xAI's Grok were specifically identified as vulnerable to this abuse technique.
Source: The Hacker News
"Vibe Extortion" Using AI
Unit 42 researchers observed low-skilled threat actors using large language models to script professional extortion campaigns, complete with deadlines and psychological pressure tactics. This democratization of attack capabilities lowers the barrier for less sophisticated criminals.
Source: Infosecurity Magazine
API Threats Amplified by AI
New research indicates attackers are increasingly abusing APIs at machine speed, with AI-driven systems widening exposure and amplifying impact. Organizations should review API security controls and monitoring capabilities.
Source: SecurityWeek
Mobile and Firmware Threats
Keenadu Android Backdoor
Kaspersky researchers discovered a sophisticated Android malware called "Keenadu" embedded in device firmware from multiple brands. The backdoor:
- Is delivered through signed OTA updates, bypassing typical security controls
- Can compromise all installed applications
- Enables silent data harvesting and remote device control
- Has been found in both firmware and Google Play applications
Source: The Hacker News, Bleeping Computer
ZeroDayRAT Spyware
A new commercial spyware toolkit dubbed "ZeroDayRAT" is targeting both Android and iOS devices. The toolkit's commercial availability suggests potential use by both criminal actors and surveillance operations.
Source: CSO Online
3. Sector-Specific Analysis
Energy Sector
Threat Level: ELEVATED
The energy sector faces heightened risk from multiple threat vectors this week:
- ICS Vulnerabilities: CISA issued advisories for GE Vernova Enervista UR Setup and Siemens Simcenter products commonly deployed in energy sector environments
- Industrial Targeting: Dragos's identification of three new ICS-focused threat groups, combined with rising ransomware targeting industrial operations, indicates sustained adversary interest in energy infrastructure
- Supply Chain Risk: The Dell RecoverPoint zero-day exploitation demonstrates how virtualization and backup infrastructure can serve as attack vectors into operational environments
Recommended Actions:
- Review CISA ICS advisories for GE Vernova and Siemens products
- Assess backup and recovery infrastructure for potential compromise indicators
- Enhance monitoring of IT/OT boundary points
Water & Wastewater Systems
Threat Level: MODERATE
Water utilities should note the broader ICS/OT threat landscape developments:
- The emergence of new threat groups targeting industrial systems applies across sectors
- Identity-based attack trends (two-thirds of breaches) highlight the importance of access control in SCADA and control system environments
- Smaller utilities with limited security resources remain particularly vulnerable to ransomware campaigns
Recommended Actions:
- Review and strengthen identity and access management for control systems
- Ensure offline backup capabilities for critical operational data
- Consider participation in CISA's CIRCIA input process to shape sector-appropriate reporting requirements
Communications & Information Technology
Threat Level: ELEVATED
Chrome Zero-Day Under Active Exploitation
Google has confirmed an exploit is available for a new Chrome zero-day vulnerability. Organizations should prioritize browser updates across enterprise environments.
Source: CSO Online
VSCode Extension Vulnerabilities
High to critical severity vulnerabilities affecting popular Visual Studio Code extensions—collectively downloaded over 128 million times—could be exploited to steal local files and credentials. Development environments represent an often-overlooked attack surface.
Source: Bleeping Computer
Microsoft Teams Outage
Microsoft is addressing an ongoing outage affecting Teams users in the United States and Europe, causing delays and access issues. While not security-related, this highlights dependency risks on cloud collaboration platforms.
Source: Bleeping Computer
Password Manager Vulnerabilities
ETH Zurich researchers tested Bitwarden, LastPass, Dashlane, and 1Password, finding vulnerabilities that could enable vault compromise under malicious server conditions. Organizations relying on enterprise password managers should review vendor security advisories.
Source: SecurityWeek
Transportation Systems
Threat Level: MODERATE
Eurail Data Breach
Hackers are offering to sell millions of Eurail user records. Eurail has confirmed the stolen data is for sale but is still determining the scope of impact. While this incident affects European rail, it highlights data protection challenges across transportation sector customer systems.
Source: SecurityWeek
Recommended Actions:
- Review customer data protection controls and breach notification procedures
- Assess third-party data sharing arrangements
- Monitor for credential stuffing attempts using potentially compromised data
Healthcare & Public Health
Threat Level: ELEVATED
2025 Healthcare Breach Analysis
Security Magazine published analysis of the top 20 healthcare data breaches from 2025, providing valuable lessons for the sector. Healthcare organizations should review these incidents for applicable defensive insights.
Source: Security Magazine
AI Copilot Data Exposure Risk
Internal AI assistants are creating a new class of data exposure risk, particularly concerning for healthcare organizations handling protected health information. Organizations deploying AI copilots should assess data access controls and potential for inadvertent disclosure.
Source: Security Magazine
Financial Services
Threat Level: MODERATE
Financial services organizations should note:
- Identity Attack Trends: The Unit 42 finding that two-thirds of breaches start with identity abuse is particularly relevant for financial institutions
- API Security: AI-amplified API attacks pose significant risk to financial services APIs
- Infostealer Activity: The SmartLoader campaign distributing StealC infostealer through trojanized MCP servers represents ongoing credential theft risk
Source: The Hacker News
4. Vulnerability & Mitigation Updates
Critical Vulnerabilities Requiring Immediate Attention
| Product | Severity | Status | Action Required |
|---|---|---|---|
| Dell RecoverPoint for VMs | Critical | Zero-day under active exploitation | Apply patches immediately; hunt for IOCs |
| Google Chrome | High | Exploit available | Update to latest version |
| VSCode Extensions (multiple) | High-Critical | Vulnerabilities disclosed | Review and update extensions |
CISA ICS Advisories (Published February 17, 2026)
CISA released four ICS advisories this week:
- ICSA-26-048-04: Honeywell CCTV Products - Successful exploitation could allow unauthorized access to surveillance systems
- ICSA-26-048-03: GE Vernova Enervista UR Setup - Multiple vulnerabilities affecting protective relay configuration software
- ICSA-26-048-02: Delta Electronics ASDA-Soft - Vulnerabilities in servo drive software
- ICSA-26-048-01: Siemens Simcenter Femap and Nastran - Engineering simulation software vulnerabilities
Recommended Action: Review full advisories and assess applicability to your environment. Prioritize patching for internet-facing or critical systems.
Recommended Defensive Measures
For Dell RecoverPoint Zero-Day:
- Apply vendor patches as soon as available
- Review logs for indicators of compromise dating back to mid-2024
- Segment backup infrastructure from production networks
- Monitor for Grimbolt/Brickstorm malware indicators
For Identity-Based Attack Prevention:
- Implement phishing-resistant MFA across all critical systems
- Review and minimize standing privileges
- Deploy identity threat detection capabilities
- Audit service account usage and permissions
For AI/Copilot Security:
- Inventory AI assistants deployed across the organization
- Review data access permissions for AI systems
- Implement data loss prevention controls for AI interactions
- Establish acceptable use policies for AI tools
Software Security Improvements
Notepad++ Update Security Enhancement: Notepad++ has implemented a "double-lock" mechanism for its update process following a recent supply chain compromise. This represents a positive example of vendors responding to security incidents with architectural improvements.
Source: Bleeping Computer
5. Resilience & Continuity Planning
Lessons from Recent Incidents
Dell Zero-Day: Detection Gap Analysis
The 18-month exploitation window for the Dell RecoverPoint vulnerability highlights critical lessons:
- Backup Infrastructure as Target: Disaster recovery systems are high-value targets that may receive less security scrutiny than production systems
- Extended Dwell Time: Sophisticated actors can maintain persistent access for extended periods without detection
- Vendor Trust: Signed updates and legitimate vendor infrastructure can be weaponized
Recommended Actions:
- Include backup and recovery infrastructure in threat hunting programs
- Implement behavioral monitoring for backup systems
- Maintain offline backup copies that cannot be compromised through network access
Basic Security Failures Enable Attacks
Palo Alto Networks analysis finds that cyber attacks continue to be enabled by basic security failings. Organizations should ensure foundational controls are in place before investing in advanced capabilities.
Source: CSO Online
Supply Chain Security
Strategic Supply Chain Considerations
NIST has highlighted that recent disruptions—from pandemics to infrastructure failures to changing trade policies—have exposed critical vulnerabilities in U.S. supply chains. Organizations should:
- Map critical dependencies across technology and operational supply chains
- Identify single points of failure
- Develop alternative sourcing strategies for critical components
- Participate in sector-specific supply chain security initiatives
Cross-Sector Dependencies
This week's intelligence highlights several cross-sector dependency risks:
- Virtualization Infrastructure: The Dell zero-day affects organizations across all sectors using VMware environments with RecoverPoint
- Cloud Collaboration: Microsoft Teams outage demonstrates dependency on cloud services for business continuity
- Identity Systems: Identity-based attacks can cascade across integrated systems and sectors
Living Risk Registers
Former CIO Ann Dunkin emphasizes that "living risk registers" are key to real cyber resilience. Organizations should maintain dynamic risk documentation that evolves with the threat landscape rather than static annual assessments.
Source: Homeland Security Today
6. Regulatory & Policy Developments
CISA CIRCIA Industry Input Request
Action Opportunity: CISA is actively seeking industry input on the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA). This represents a significant opportunity for critical infrastructure owners and operators to shape incident reporting requirements.
Key Considerations:
- Reporting timelines and thresholds
- Definition of covered incidents
- Information sharing protections
- Sector-specific considerations
Recommended Action: Organizations should review CISA's request and submit comments through official channels. Coordinate with sector ISACs and trade associations for collective input.
Source: Homeland Security Today
CISA 2025 Year in Review
CISA has released its 2025 Year in Review, providing insights into agency priorities, accomplishments, and future direction. Critical infrastructure stakeholders should review this document to understand CISA's evolving role and available resources.
Source: Homeland Security Today
International Developments
Spain VPN Blocking Order
A Spanish court has ordered NordVPN and ProtonVPN to block 16 websites facilitating piracy of football matches. While focused on copyright enforcement, this precedent has implications for VPN providers and internet freedom considerations.
Source: Bleeping Computer
Ireland X/Grok Investigation
Ireland's Data Protection Commission has opened a formal investigation into X (formerly Twitter) over the use of the Grok AI tool to generate content, including concerns about sexual imagery generation. This investigation may have broader implications for AI governance.
Source: Bleeping Computer
Surveillance Technology Concerns
Citizen Lab has linked Cellebrite phone-cracking technology to the hacking of a Kenyan presidential candidate's phone following his arrest. This research highlights ongoing concerns about surveillance technology use and potential for abuse.
Source: CyberScoop
7. Training & Resource Spotlight
Industry Investment
VulnCheck Series B Funding
Vulnerability intelligence firm VulnCheck has raised $25 million in Series B funding led by Sorenson Capital, bringing total investment to $45 million. This investment signals continued market demand for vulnerability intelligence capabilities.
Source: SecurityWeek
Palo Alto Networks Acquires Koi
Palo Alto Networks has acquired Koi to improve visibility into AI-driven activity on workplace devices. This acquisition reflects growing enterprise focus on AI agent security.
Source: CyberScoop
Platform Security Updates
Android 17 Beta Security Features
Android 17 Beta introduces a secure-by-default architecture with enhanced privacy and security controls. Organizations managing mobile device fleets should evaluate these improvements for future deployment planning.
Source: Infosecurity Magazine
iOS 26.4 Security Enhancements
Apple's iOS 26.4 developer beta adds:
- End-to-end encryption for RCS messaging
- Enhanced Memory Integrity Enforcement
These improvements will enhance security for enterprise iOS deployments when generally available.
Source: Infosecurity Magazine, The Hacker News
Research and Analysis Resources
- Dragos 9th Annual OT/ICS Cybersecurity Report: Comprehensive analysis of industrial cybersecurity threats and trends
- Unit 42 Incident Response Report: Analysis of breach patterns and identity-based attack trends
- ETH Zurich Password Manager Research: Security analysis of major password management solutions
CISO Resources
Multiple reports this week address CISO challenges:
- Re-envisioning Enterprise Risk: CSO Online analysis of how stretched security leaders can restructure risk management approaches
- Agentic AI Challenges: Analysis of why autonomous AI systems present new security management challenges
Source: CSO Online
8. Looking Ahead: Upcoming Events
Upcoming Workshops and Conferences
NIST Cybersecurity for IoT Workshop: Future Directions
Date: March 31, 2026
Focus: Emerging and future trends for IoT technologies and their implications for IoT cybersecurity. As IoT becomes more sophisticated, automated, and ubiquitous, this workshop will address evolving security requirements.
Relevance: Critical for organizations deploying IoT in operational technology environments
Source: NIST
NIST Building the Strategic Supply Chain Network
Date: March 9, 2026
Focus: Addressing critical vulnerabilities in U.S. supply chains exposed by recent disruptions including pandemics, infrastructure failures, and changing trade policies
Relevance: Essential for supply chain security planning across critical infrastructure sectors
Source: NIST
Threat Periods Requiring Heightened Awareness
- Ongoing: Chinese APT activity exploiting Dell infrastructure—organizations should conduct threat hunting for historical compromise
- Ongoing: Industrial ransomware campaigns targeting operational technology environments
- Ongoing: Identity-based attacks across enterprise environments
Anticipated Regulatory Milestones
- CIRCIA Rulemaking: Monitor CISA announcements for comment period deadlines and draft rule publication
- AI Governance: Watch for developments from Ireland DPC investigation into AI-generated content
Seasonal Considerations
- Tax Season (U.S.): Heightened phishing and social engineering activity
This briefing is generated using AI analysis of public news sources. Always verify critical information through authoritative sources before taking action.