React2Shell flaw exploited for PeerBlight malware on Linux

A critical vulnerability in React Server Components, known as React2Shell and tracked as CVE-2025-55182, is being actively exploited to deploy a new Linux backdoor called PeerBlight. This malware turns compromised servers into covert proxy and command-and-control nodes. Attackers use a single crafted HTTP request to execute arbitrary code on vulnerable Next.js and React applications.

The React2Shell vulnerability arises from an insecure deserialization issue in how React Server Components handle React Flight “chunks.” An unauthenticated attacker can inject malicious logic through a specially crafted “thenable” object, forcing the server to execute arbitrary JavaScript during server-side rendering. This flaw impacts several versions of the react-server-dom package and has been observed in attacks on internet-exposed Next.js applications, often initiated with simple curl or wget commands to fetch shell scripts and ELF payloads.

Security researchers have noted active scanning using a publicly available React2Shell scanner, identifiable by its default User-Agent in logs. Exploitation has occurred in the wild, enabling follow-on activities such as malware delivery, cryptomining, and persistence mechanisms.

Once inside, attackers deploy PeerBlight, a sophisticated Linux backdoor with a multi-layered command-and-control (C2) structure. It initially connects to a hardcoded C2 server at 185.247.224.41:8443, negotiating AES-256 session keys through RSA-encrypted handshakes. The malware sends JSON beacons detailing the host's architecture, operating system, and a campaign group identifier. If the primary C2 fails, it resorts to a domain generation algorithm (DGA) that creates up to 200 domain-port pairs, and ultimately leverages the BitTorrent DHT network with a distinctive node ID prefix “LOLlolLOL” for peer-to-peer C2 discovery.

For persistence and stealth, PeerBlight copies itself to /bin/systemd-daemon and registers as systemd-agent on systems using systemd, or drops an Upstart job on older distributions. It overwrites argv and process names to mimic a kernel [ksoftirqd] thread, evading detection in process lists.

The backdoor handles at least 10 JSON-based command types, including file uploads and downloads, reverse-shell spawning, permission modifications, arbitrary binary execution, and in-memory upgrades. This setup transforms infected hosts into resilient proxy nodes for further intrusions and lateral movement.

The same campaign has also introduced tools like CowTunnel (a reverse-proxy based on xfrpc), ZinFoq (a Go implant with SOCKS5 pivoting and timestomping), XMRig cryptominers, and a Kaiji botnet variant for DDoS and watchdog functions. Organizations using vulnerable React Server Components or Next.js are advised to apply patches immediately and monitor for PeerBlight indicators, such as its binaries, systemd-agent files, LOLlolLOL DHT nodes, and traffic to known C2 endpoints.

관련 기사

Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
AI에 의해 생성된 이미지

Malicious npm packages steal developer credentials on multiple platforms

AI에 의해 보고됨 AI에 의해 생성된 이미지

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

AI에 의해 보고됨

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

AI에 의해 보고됨

A new botnet known as GoBruteforcer has emerged, focusing on brute-force attacks against Linux servers. The threat was reported by IT Security News on January 12, 2026. Details highlight the botnet's specific targeting of these systems.

SentinelOne researchers have disclosed a critical flaw in CyberVolk's new VolkLocker ransomware-as-a-service: a hardcoded master key stored in plaintext, enabling victims to decrypt files without ransom payment. Following the group's August 2025 relaunch after Telegram bans, this weakness underscores quality issues in their RaaS ecosystem.

AI에 의해 보고됨

Cisco Talos has reported a China-linked threat actor known as UAT-7290 that has been spying on telecommunications companies since 2022. The group uses Linux malware, exploits on edge devices, and ORB infrastructure to maintain access to targeted networks.

 

 

 

이 웹사이트는 쿠키를 사용합니다

사이트를 개선하기 위해 분석을 위한 쿠키를 사용합니다. 자세한 내용은 개인정보 보호 정책을 읽으세요.
거부