React2Shell exploits continue with large-scale Linux backdoor deployments and cloud credential theft

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

Following earlier reports on PeerBlight and subsequent attacks by groups like UNC6600, UNC6586, UNC6588, UNC6603, and financially motivated actors deploying malware such as MINOCAT, SNOWLIGHT, HISONIC, COMPOOD, ANGRYREBEL.LINUX, and XMRig miners, cybersecurity researchers confirm active, large-scale exploitation of React2Shell (CVE-2025-55182).

Attackers continue leveraging this critical RCE flaw (CVSS 10.0, affecting React 19.0–19.2.0) to install backdoors on Linux systems, execute arbitrary commands, and target cloud credentials for theft.

While patches are available (React 19.0.1, 19.1.2, 19.2.1+), the persistent threats underscore the need for administrators to apply mitigations like Cloud Armor WAF, monitor IOCs from prior coverage, and secure React/Next.js applications amid software supply chain risks.

Makala yanayohusiana

Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Picha iliyoundwa na AI

Malicious npm packages steal developer credentials on multiple platforms

Imeripotiwa na AI Picha iliyoundwa na AI

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

Imeripotiwa na AI

A critical vulnerability in React Server Components, known as React2Shell and tracked as CVE-2025-55182, is being actively exploited to deploy a new Linux backdoor called PeerBlight. This malware turns compromised servers into covert proxy and command-and-control nodes. Attackers use a single crafted HTTP request to execute arbitrary code on vulnerable Next.js and React applications.

At the NDSS 2025 conference, Hengkai Ye and Hong Hu from The Pennsylvania State University presented a paper on subtle vulnerabilities in Linux systems that reintroduce executable stacks. Their work highlights how developers, including security experts, accidentally disable protections against code injection attacks. The study examines tools and system components to reveal gaps in enforcing write-xor-execute policies.

Imeripotiwa na AI

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

Imeripotiwa na AI

A security researcher has found that bugs in the Linux kernel often remain undetected for more than two years on average, with some persisting for over two decades. By analyzing 20 years of kernel development, Jenny Guanni Qu uncovered how these flaws quietly affect cloud systems, enterprises, and billions of devices. Her work highlights the challenges of maintaining secure open-source software.

Ijumaa, 30. Mwezi wa kwanza 2026, 21:23:53

Researchers uncover ShadowHS Linux exploitation framework

Jumatano, 21. Mwezi wa kwanza 2026, 06:39:13

NVIDIA fixes critical flaw in NSIGHT Graphics for Linux

Jumamosi, 17. Mwezi wa kwanza 2026, 16:30:57

GNU C Library fixes security issue from 1996

Alhamisi, 8. Mwezi wa kwanza 2026, 06:04:40

Linux battery utility TLP patched after authentication bypass flaw

Ijumaa, 26. Mwezi wa kumi na mbili 2025, 10:47:03

Rust in Linux Kernel: Full Integration, First Vulnerabilities, and 2025 Milestones

Ijumaa, 19. Mwezi wa kumi na mbili 2025, 11:19:21

Cisco email security products targeted in zero-day campaign

Jumatano, 10. Mwezi wa kumi na mbili 2025, 07:11:22

North Korean hackers exploit maximum severity React2Shell flaw

Jumatano, 5. Mwezi wa kumi na moja 2025, 22:25:46

Russian hackers use Linux VMs to hide malware on Windows

Jumatatu, 27. Mwezi wa kumi 2025, 10:24:45

Qilin ransomware deploys Linux binaries against Windows systems

Ijumaa, 17. Mwezi wa kumi 2025, 00:30:21

Operation Zero Disco exploits Cisco SNMP flaw for rootkits

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa