Grupos com nexo à China e cibercriminosos intensificam exploits do React2Shell

Com base em ataques anteriores do PeerBlight, o Google Threat Intelligence relata a exploração da vulnerabilidade React2Shell (CVE-2025-55182) por clusters com nexo à China e atores motivados financeiramente que implantam backdoors e mineradores de criptomoedas em sistemas vulneráveis de React e Next.js.

Como detalhado na cobertura anterior da campanha de backdoor Linux PeerBlight que explora o React2Shell (CVE-2025-55182)—uma falha crítica de RCE em React Server Components divulgada em 3 de dezembro de 2025—, atores de ameaça adicionais intensificaram os ataques. A vulnerabilidade (CVSS 10.0) afeta as versões React 19.0, 19.1.0, 19.1.1 e 19.2.0 devido à decodificação inadequada de payload, permitindo execução de código não autenticada via requisições HTTP manipuladas.

O Google Threat Intelligence Group (GTIG) observou campanhas de grupos com nexo à China UNC6600, UNC6586, UNC6588 e UNC6603 logo após a divulgação. UNC6600 implanta túnel MINOCAT via jobs cron e systemd; UNC6586 usa downloader SNOWLIGHT ligado a reactcdn.windowserrorapis[.]com; UNC6603 emprega backdoor HISONIC atualizado baseado em Go hospedado no Cloudflare/GitLab, visando nuvens Ásia-Pacífico. Malware adicional inclui backdoor COMPOOD (disfarçado de utilitários) e ANGRYREBEL.LINUX (imitador de daemon SSH com timestomping).

A partir de 5 de dezembro, atores motivados financeiramente implantaram mineradores XMRig usando sex.sh, criando serviços systemd falsos 'system-update-service'. Repositórios de exploits, incluindo webshells em memória, estão proliferando.

Mitigar atualizando para React 19.0.1, 19.1.2 ou 19.2.1+, usando Cloud Armor WAF, monitorando IOCs como $HOME/.systemd-utils, IPs 45.76.155[.]14 e 82.163.22[.]139, e hashes VirusTotal do GTIG para MINOCAT, COMPOOD, SNOWLIGHT.

Artigos relacionados

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Imagem gerada por IA

Researchers discover SSHStalker botnet infecting Linux servers

Reportado por IA Imagem gerada por IA

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

Reportado por IA

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

A security vulnerability in Dell software has reportedly remained unpatched for almost two years, allowing Chinese hackers to exploit it. The flaw involves hardcoded login credentials in a tool, raising concerns about data security.

Reportado por IA

The Hacker News has released its latest ThreatsDay Bulletin, focusing on various cybersecurity issues. The bulletin covers topics such as Kali Linux combined with Claude, Chrome crash traps, WinRAR flaws, and activities related to LockBit. It also includes over 15 additional stories on emerging threats.

terça-feira, 05 de maio de 2026, 17:44h

US government issues urgent CopyFail warning as Linux patches roll out

terça-feira, 05 de maio de 2026, 12:10h

Daemon Tools app hit by monthlong supply-chain attack

quarta-feira, 22 de abril de 2026, 09:46h

Microsoft patches critical ASP.NET Core vulnerability on macOS and Linux

segunda-feira, 23 de fevereiro de 2026, 08:01h

Malicious npm packages harvest crypto keys and secrets

quinta-feira, 19 de fevereiro de 2026, 13:36h

Researchers uncover new SysUpdate malware variant targeting Linux

quarta-feira, 18 de fevereiro de 2026, 23:37h

New SysUpdate malware variant targets Linux systems

Este site usa cookies

Usamos cookies para análise para melhorar nosso site. Leia nossa política de privacidade para mais informações.
Recusar