React2Shell flaw exploited for PeerBlight malware on Linux

A critical vulnerability in React Server Components, known as React2Shell and tracked as CVE-2025-55182, is being actively exploited to deploy a new Linux backdoor called PeerBlight. This malware turns compromised servers into covert proxy and command-and-control nodes. Attackers use a single crafted HTTP request to execute arbitrary code on vulnerable Next.js and React applications.

The React2Shell vulnerability arises from an insecure deserialization issue in how React Server Components handle React Flight “chunks.” An unauthenticated attacker can inject malicious logic through a specially crafted “thenable” object, forcing the server to execute arbitrary JavaScript during server-side rendering. This flaw impacts several versions of the react-server-dom package and has been observed in attacks on internet-exposed Next.js applications, often initiated with simple curl or wget commands to fetch shell scripts and ELF payloads.

Security researchers have noted active scanning using a publicly available React2Shell scanner, identifiable by its default User-Agent in logs. Exploitation has occurred in the wild, enabling follow-on activities such as malware delivery, cryptomining, and persistence mechanisms.

Once inside, attackers deploy PeerBlight, a sophisticated Linux backdoor with a multi-layered command-and-control (C2) structure. It initially connects to a hardcoded C2 server at 185.247.224.41:8443, negotiating AES-256 session keys through RSA-encrypted handshakes. The malware sends JSON beacons detailing the host's architecture, operating system, and a campaign group identifier. If the primary C2 fails, it resorts to a domain generation algorithm (DGA) that creates up to 200 domain-port pairs, and ultimately leverages the BitTorrent DHT network with a distinctive node ID prefix “LOLlolLOL” for peer-to-peer C2 discovery.

For persistence and stealth, PeerBlight copies itself to /bin/systemd-daemon and registers as systemd-agent on systems using systemd, or drops an Upstart job on older distributions. It overwrites argv and process names to mimic a kernel [ksoftirqd] thread, evading detection in process lists.

The backdoor handles at least 10 JSON-based command types, including file uploads and downloads, reverse-shell spawning, permission modifications, arbitrary binary execution, and in-memory upgrades. This setup transforms infected hosts into resilient proxy nodes for further intrusions and lateral movement.

The same campaign has also introduced tools like CowTunnel (a reverse-proxy based on xfrpc), ZinFoq (a Go implant with SOCKS5 pivoting and timestomping), XMRig cryptominers, and a Kaiji botnet variant for DDoS and watchdog functions. Organizations using vulnerable React Server Components or Next.js are advised to apply patches immediately and monitor for PeerBlight indicators, such as its binaries, systemd-agent files, LOLlolLOL DHT nodes, and traffic to known C2 endpoints.

Awọn iroyin ti o ni ibatan

Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Àwòrán tí AI ṣe

Malicious npm packages steal developer credentials on multiple platforms

Ti AI ṣe iroyin Àwòrán tí AI ṣe

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

Ti AI ṣe iroyin

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

Ti AI ṣe iroyin

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

Threat actors are shifting from traditional languages like C and C++ to modern ones such as Rust, enabling cross-platform malware development. A new Rust-based information stealer called Luca has emerged, released openly to the public. This development highlights growing use of Rust in malware, posing new challenges for cybersecurity defenders.

Ti AI ṣe iroyin

Elastic Security Labs has detailed the evolution of Linux rootkits in a two-part research series published on March 5, 2026. These modern threats exploit kernel features like eBPF and io_uring to remain hidden in cloud, IoT, and server environments. The research highlights how such rootkits evade traditional detection methods.

 

 

 

Ojú-ìwé yìí nlo kuki

A nlo kuki fun itupalẹ lati mu ilọsiwaju wa. Ka ìlànà àṣírí wa fun alaye siwaju sii.
Kọ