China-nexus groups and cybercriminals ramp up React2Shell exploits

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

As detailed in prior coverage of the PeerBlight Linux backdoor campaign exploiting React2Shell (CVE-2025-55182)—a critical RCE flaw in React Server Components disclosed December 3, 2025—additional threat actors have intensified attacks. The vulnerability (CVSS 10.0) affects React versions 19.0, 19.1.0, 19.1.1, and 19.2.0 due to improper payload decoding, enabling unauthenticated code execution via crafted HTTP requests.

Google Threat Intelligence Group (GTIG) observed campaigns by China-nexus groups UNC6600, UNC6586, UNC6588, and UNC6603 shortly after disclosure. UNC6600 deploys MINOCAT tunneling via cron jobs and systemd; UNC6586 uses SNOWLIGHT downloader linking to reactcdn.windowserrorapis[.]com; UNC6603 employs an updated Go-based HISONIC backdoor hosted on Cloudflare/GitLab, targeting Asia-Pacific clouds. Additional malware includes COMPOOD backdoor (masquerading as utilities) and ANGRYREBEL.LINUX (SSH daemon mimic with timestomping).

From December 5, financially motivated actors deployed XMRig miners using sex.sh, creating fake 'system-update-service' systemd services. Exploit repos, including in-memory webshells, are proliferating.

Mitigate by upgrading to React 19.0.1, 19.1.2, or 19.2.1+, using Cloud Armor WAF, monitoring for IOCs like $HOME/.systemd-utils, IPs 45.76.155[.]14 and 82.163.22[.]139, and GTIG’s VirusTotal hashes for MINOCAT, COMPOOD, SNOWLIGHT.

관련 기사

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
AI에 의해 생성된 이미지

Researchers discover SSHStalker botnet infecting Linux servers

AI에 의해 보고됨 AI에 의해 생성된 이미지

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

AI에 의해 보고됨

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

A security vulnerability in Dell software has reportedly remained unpatched for almost two years, allowing Chinese hackers to exploit it. The flaw involves hardcoded login credentials in a tool, raising concerns about data security.

AI에 의해 보고됨

The Hacker News has released its latest ThreatsDay Bulletin, focusing on various cybersecurity issues. The bulletin covers topics such as Kali Linux combined with Claude, Chrome crash traps, WinRAR flaws, and activities related to LockBit. It also includes over 15 additional stories on emerging threats.

이 웹사이트는 쿠키를 사용합니다

사이트를 개선하기 위해 분석을 위한 쿠키를 사용합니다. 자세한 내용은 개인정보 보호 정책을 읽으세요.
거부