China-nexus groups and cybercriminals ramp up React2Shell exploits

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

As detailed in prior coverage of the PeerBlight Linux backdoor campaign exploiting React2Shell (CVE-2025-55182)—a critical RCE flaw in React Server Components disclosed December 3, 2025—additional threat actors have intensified attacks. The vulnerability (CVSS 10.0) affects React versions 19.0, 19.1.0, 19.1.1, and 19.2.0 due to improper payload decoding, enabling unauthenticated code execution via crafted HTTP requests.

Google Threat Intelligence Group (GTIG) observed campaigns by China-nexus groups UNC6600, UNC6586, UNC6588, and UNC6603 shortly after disclosure. UNC6600 deploys MINOCAT tunneling via cron jobs and systemd; UNC6586 uses SNOWLIGHT downloader linking to reactcdn.windowserrorapis[.]com; UNC6603 employs an updated Go-based HISONIC backdoor hosted on Cloudflare/GitLab, targeting Asia-Pacific clouds. Additional malware includes COMPOOD backdoor (masquerading as utilities) and ANGRYREBEL.LINUX (SSH daemon mimic with timestomping).

From December 5, financially motivated actors deployed XMRig miners using sex.sh, creating fake 'system-update-service' systemd services. Exploit repos, including in-memory webshells, are proliferating.

Mitigate by upgrading to React 19.0.1, 19.1.2, or 19.2.1+, using Cloud Armor WAF, monitoring for IOCs like $HOME/.systemd-utils, IPs 45.76.155[.]14 and 82.163.22[.]139, and GTIG’s VirusTotal hashes for MINOCAT, COMPOOD, SNOWLIGHT.

Mga Kaugnay na Artikulo

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Larawang ginawa ng AI

Researchers discover SSHStalker botnet infecting Linux servers

Iniulat ng AI Larawang ginawa ng AI

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

Iniulat ng AI

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

The Hacker News has released its latest ThreatsDay Bulletin, focusing on various cybersecurity issues. The bulletin covers topics such as Kali Linux combined with Claude, Chrome crash traps, WinRAR flaws, and activities related to LockBit. It also includes over 15 additional stories on emerging threats.

Iniulat ng AI

Daemon Tools, a popular disk image mounting app, was compromised in a supply-chain attack starting April 8, delivering malware through official updates. Security firm Kaspersky reported infections on thousands of machines across over 100 countries. Users are urged to scan their systems immediately.

Gumagamit ng cookies ang website na ito

Gumagamit kami ng cookies para sa analytics upang mapabuti ang aming site. Basahin ang aming patakaran sa privacy para sa higit pang impormasyon.
Tanggihan