China-nexus groups and cybercriminals ramp up React2Shell exploits

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

As detailed in prior coverage of the PeerBlight Linux backdoor campaign exploiting React2Shell (CVE-2025-55182)—a critical RCE flaw in React Server Components disclosed December 3, 2025—additional threat actors have intensified attacks. The vulnerability (CVSS 10.0) affects React versions 19.0, 19.1.0, 19.1.1, and 19.2.0 due to improper payload decoding, enabling unauthenticated code execution via crafted HTTP requests.

Google Threat Intelligence Group (GTIG) observed campaigns by China-nexus groups UNC6600, UNC6586, UNC6588, and UNC6603 shortly after disclosure. UNC6600 deploys MINOCAT tunneling via cron jobs and systemd; UNC6586 uses SNOWLIGHT downloader linking to reactcdn.windowserrorapis[.]com; UNC6603 employs an updated Go-based HISONIC backdoor hosted on Cloudflare/GitLab, targeting Asia-Pacific clouds. Additional malware includes COMPOOD backdoor (masquerading as utilities) and ANGRYREBEL.LINUX (SSH daemon mimic with timestomping).

From December 5, financially motivated actors deployed XMRig miners using sex.sh, creating fake 'system-update-service' systemd services. Exploit repos, including in-memory webshells, are proliferating.

Mitigate by upgrading to React 19.0.1, 19.1.2, or 19.2.1+, using Cloud Armor WAF, monitoring for IOCs like $HOME/.systemd-utils, IPs 45.76.155[.]14 and 82.163.22[.]139, and GTIG’s VirusTotal hashes for MINOCAT, COMPOOD, SNOWLIGHT.

Articoli correlati

Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Immagine generata dall'IA

Malicious npm packages steal developer credentials on multiple platforms

Riportato dall'IA Immagine generata dall'IA

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

Riportato dall'IA

A critical vulnerability in React Server Components, known as React2Shell and tracked as CVE-2025-55182, is being actively exploited to deploy a new Linux backdoor called PeerBlight. This malware turns compromised servers into covert proxy and command-and-control nodes. Attackers use a single crafted HTTP request to execute arbitrary code on vulnerable Next.js and React applications.

Threat actors are shifting from traditional languages like C and C++ to modern ones such as Rust, enabling cross-platform malware development. A new Rust-based information stealer called Luca has emerged, released openly to the public. This development highlights growing use of Rust in malware, posing new challenges for cybersecurity defenders.

Riportato dall'IA

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

At the NDSS 2025 conference, Hengkai Ye and Hong Hu from The Pennsylvania State University presented a paper on subtle vulnerabilities in Linux systems that reintroduce executable stacks. Their work highlights how developers, including security experts, accidentally disable protections against code injection attacks. The study examines tools and system components to reveal gaps in enforcing write-xor-execute policies.

Riportato dall'IA

Cyber threat actors in Operation Zero Disco have exploited a vulnerability in Cisco's SNMP service to install persistent Linux rootkits on network devices. The campaign targets older Cisco switches and uses crafted packets to achieve remote code execution. Trend Micro researchers disclosed the attacks on October 16, 2025, highlighting risks to unpatched systems.

 

 

 

Questo sito web utilizza i cookie

Utilizziamo i cookie per l'analisi per migliorare il nostro sito. Leggi la nostra politica sulla privacy per ulteriori informazioni.
Rifiuta