Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Defining proactive cloud security with new layers of defense

OpenAI says AI browsers can always be vulnerable to prompt injection attacks

Alphabet to acquire Intersect Power to avoid energy grid bottlenecks

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Chinese hackers have begun exploiting newly disclosed React2Shell vulnerabilities
Identity

Chinese hackers have begun exploiting newly disclosed React2Shell vulnerabilities

userBy userDecember 5, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 5, 2025Ravi LakshmananVulnerabilities/Software Security

Two Chinese-linked hacker groups were observed weaponizing a newly revealed security flaw in React Server Components (RSC) within hours of it becoming public knowledge.

The vulnerability in question is CVE-2025-55182 (CVSS score: 10.0), also known as React2Shell, which allows unauthenticated remote code execution. This issue is addressed in React versions 19.0.1, 19.1.2, and 19.2.1.

Two China-linked threat actors known as Earth Lamia and Jackpot Panda have been observed attempting to exploit maximum severity security flaws, according to a new report shared by Amazon Web Services (AWS).

“Our analysis of exploitation attempts on the AWS MadPot honeypot infrastructure identified exploit activity from IP addresses and infrastructure historically associated with known Chinese state-aligned threat actors,” CJ Moses, CISO at Amazon Integrated Security, said in a report shared with The Hacker News.

cyber security

Specifically, the technology giant said it has identified infrastructure associated with Earth Lamia, a China-aligned group, believed to have stemmed from an attack earlier this year that exploited a critical flaw in SAP NetWeaver (CVE-2025-31324).

The hacking group targeted sectors such as financial services, logistics, retail, IT companies, universities, and government agencies in Latin America, the Middle East, and Southeast Asia.

This campaign also stems from infrastructure associated with another China-linked cyber threat actor known as Jackpot Panda, which identifies organizations primarily engaged in or supporting online gambling operations in East and Southeast Asia.

According to CrowdStrike, Jackpot Panda is assessed to have been active since at least 2020, targeting trusted third-party relationships in order to deploy malicious implants and gain initial access. Specifically, this threat actor was involved in a supply chain breach of a chat app known as Comm100 in September 2022. This activity is tracked by ESET as Operation Chatty Goblin.

It was later revealed that Chinese hacking contractor I-Soon may have been involved in the supply chain attack due to infrastructure duplication. Interestingly, attacks launched by this group in 2023 primarily focused on Chinese-speaking victims, indicating the potential for domestic surveillance.

“Starting in May 2023, attackers used a trojanized installer for CloudChat, a China-based chat application popular in mainland China’s illegal Chinese-speaking gambling community,” CrowdStrike said in its Global Threat Report published last year.

cyber security

“The Trojanized installer provided by the CloudChat website contained the first stage of a multi-step process that ultimately deployed XShade, a new implant with code that overlapped with Jackpot Panda’s own CplRAT implant.”

Amazon announced that it also detected attackers exploiting 2025-55182, along with other N-day flaws, including the NUUO camera vulnerability (CVE-2025-1338, CVSS score: 7.3), suggesting widespread efforts to scan the internet for unpatched systems.

Observed activity includes attempts to run discovery commands (e.g., whoami), write files (e.g., “/tmp/pwned.txt”), and read files containing sensitive information (e.g., “/etc/passwd”).

“This represents a systematic approach where threat actors monitor the disclosure of new vulnerabilities, quickly integrate publicly available exploits into their scanning infrastructure, and conduct broad campaigns across multiple common vulnerabilities and exposures (CVEs) simultaneously to maximize their chances of discovering vulnerable targets,” said Moses.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNetflix to buy Warner Bros. in disruptive deal worth $82.7 billion
Next Article A huge helium shortage is looming — but ancient rocks in Earth’s crust may be hiding massive reservoirs
user
  • Website

Related Posts

Defining proactive cloud security with new layers of defense

December 23, 2025

The hidden threat of security vendor acquisitions

December 22, 2025

Fake WhatsApp API package on npm steals messages, contacts, and login tokens

December 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Defining proactive cloud security with new layers of defense

OpenAI says AI browsers can always be vulnerable to prompt injection attacks

Alphabet to acquire Intersect Power to avoid energy grid bottlenecks

Trump administration suspends 6GW of offshore wind leases again

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.