China-nexus groups and cybercriminals ramp up React2Shell exploits

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

As detailed in prior coverage of the PeerBlight Linux backdoor campaign exploiting React2Shell (CVE-2025-55182)—a critical RCE flaw in React Server Components disclosed December 3, 2025—additional threat actors have intensified attacks. The vulnerability (CVSS 10.0) affects React versions 19.0, 19.1.0, 19.1.1, and 19.2.0 due to improper payload decoding, enabling unauthenticated code execution via crafted HTTP requests.

Google Threat Intelligence Group (GTIG) observed campaigns by China-nexus groups UNC6600, UNC6586, UNC6588, and UNC6603 shortly after disclosure. UNC6600 deploys MINOCAT tunneling via cron jobs and systemd; UNC6586 uses SNOWLIGHT downloader linking to reactcdn.windowserrorapis[.]com; UNC6603 employs an updated Go-based HISONIC backdoor hosted on Cloudflare/GitLab, targeting Asia-Pacific clouds. Additional malware includes COMPOOD backdoor (masquerading as utilities) and ANGRYREBEL.LINUX (SSH daemon mimic with timestomping).

From December 5, financially motivated actors deployed XMRig miners using sex.sh, creating fake 'system-update-service' systemd services. Exploit repos, including in-memory webshells, are proliferating.

Mitigate by upgrading to React 19.0.1, 19.1.2, or 19.2.1+, using Cloud Armor WAF, monitoring for IOCs like $HOME/.systemd-utils, IPs 45.76.155[.]14 and 82.163.22[.]139, and GTIG’s VirusTotal hashes for MINOCAT, COMPOOD, SNOWLIGHT.

Related Articles

Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Image generated by AI

Malicious npm packages steal developer credentials on multiple platforms

Reported by AI Image generated by AI

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

Reported by AI

A critical vulnerability in React Server Components, known as React2Shell and tracked as CVE-2025-55182, is being actively exploited to deploy a new Linux backdoor called PeerBlight. This malware turns compromised servers into covert proxy and command-and-control nodes. Attackers use a single crafted HTTP request to execute arbitrary code on vulnerable Next.js and React applications.

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Reported by AI

Nineteen malicious packages on the npm registry are spreading a worm known as SANDWORM_MODE. These packages steal crypto keys, CI secrets, API tokens, and AI API keys. The theft occurs through MCP injection.

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

Reported by AI

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

 

 

 

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline