Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Waymo temporarily suspends service in San Francisco as robotaxis stall due to power outage

Electrical startups raise concerns as EU wateres down 2035 EV targets

Iran’s Infy APT resurfaces with new malware activity after years of silence

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » React2Shell vulnerability is actively exploited to deploy Linux backdoors
Identity

React2Shell vulnerability is actively exploited to deploy Linux backdoors

userBy userDecember 16, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

According to findings from Palo Alto Networks Unit 42 and NTT Security, a security vulnerability known as React2Shell is being exploited by threat actors to distribute malware families such as KSwapDoor and ZnDoor.

“KSwapDoor is a professionally engineered remote access tool designed with stealth in mind,” Justin Moore, senior manager of threat intelligence research at Palo Alto Networks Unit 42, said in a statement.

“It builds an internal mesh network, allowing compromised servers to communicate with each other and bypass security blocks. It uses military-grade encryption to hide communications, and most surprisingly, it features a ‘sleeper’ mode that allows attackers to wake up the malware with secret, invisible signals and bypass firewalls.”

The cybersecurity firm noted that it was previously incorrectly classified as BPFDoor, adding that the Linux backdoor provides an interactive shell, command execution, file manipulation, and lateral movement scanning capabilities. It also impersonates a legitimate Linux kernel swap daemon to evade detection.

In a related development, NTT Security said Japanese organizations are being targeted by cyberattacks that exploit React2Shell to deploy malware ZnDoor, which is assessed to have been detected in the wild since December 2023. The attack chain involves running a bash command that retrieves the payload from a remote server (45.76.155).[.]14) Execute using wget.

cyber security

Remote access Trojans connect to the same attacker-controlled infrastructure to receive commands and execute them on the host. Some of the supported commands are listed below.

shell, run a command, interactive_shell, start an interactive shell, explorer_cat, get a list of directories, explorer_cat, read and display files, explorer_delete, delete files, explorer_upload, download files from the server explorer_download, sends the file to the server system, collects system information, change_timefile, changes the file timestamp, socket_quick_startstreams, starts the SOCKS5 proxy start_in_port_forward, starts port forwarding stop_in_port, stop port forwarding

The disclosure comes as the vulnerability, tracked as CVE-2025-55182 (CVSS score: 10.0), is being exploited by multiple attackers, and Google has identified at least five China-linked groups that have weaponized it to deliver a range of payloads.

UNC6600 Distributes a tunneling utility called MINOCAT UNC6586 Distributes a downloader called SNOWLIGHT UNC6588 Distributes a backdoor called COMPOOD UNC6603 Uses Cloudflare Pages and GitLab to retrieve encrypted configuration and blend it with legitimate network activity Distributes an updated version of a Go backdoor called HISONIC UNC6595 Distributes a Linux version of Rat delivering ANGRYREBEL (also known as Noodle)

Microsoft said in its own advisory for CVE-2025-55182 that attackers are using this flaw to execute arbitrary post-exploitation commands, including setting up a reverse shell on known Cobalt Strike servers, dropping remote monitoring and management (RMM) tools such as MeshAgent, modifying the authorized_keys file, and enabling root login.

Payloads delivered in these attacks include VShell, EtherRAT, SNOWLIGHT, ShadowPad, and XMRig. This attack also features the use of Cloudflare tunnel endpoints (‘*.trycloudflare.com’) to evade security defenses, as well as reconnaissance of the compromised environment to facilitate lateral movement and credential theft.

cyber security

According to the Windows maker, this credential harvesting campaign targeted Azure Instance Metadata Service (IMDS) endpoints in Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP), and Tencent Cloud, with the ultimate goal of obtaining ID tokens to penetrate deeper into cloud infrastructure.

“The attackers also deployed secret discovery tools such as TruffleHog and Gitleaks, as well as custom scripts to extract several different secrets,” the Microsoft Defender security research team said. “We also observed attempts to harvest AI and cloud-native credentials, including OpenAI API keys, Databricks tokens, and Kubernetes service account credentials. Azure command line interface (CLI) (az) and Azure Developer CLI (azd) were also used to obtain tokens.”

In another campaign detailed by Beelzebub, attackers were observed exploiting flaws in Next.js, including CVE-2025-29927 and CVE-2025-66478 (the same React2Shell bug before being rejected as a duplicate), allowing for systematic exfiltration of credentials and sensitive data.

.env, .env.local, .env.production, .env.development System environment variables (printenv, env) SSH keys (~/.ssh/id_rsa, ~/.ssh/id_ed25519, /root/.ssh/*) Cloud credentials (~/.aws/credentials, ~/.docker/config.json Git credentials) (~/.git-credentials, ~/.gitconfig) Command history (Latest 100 commands in ~/.bash_history) System files (/etc/shadow, /etc/passwd)

The malware also creates persistence on the host to survive system reboots, installs a SOCKS5 proxy, and establishes a reverse shell to ‘67.217.57’.[.]240:888” and install the React scanner to scour the internet for further propagation.

The campaign, codenamed “Operation PCPcat,” is estimated to have already compromised 59,128 servers. “This campaign shows the characteristics of a large-scale espionage operation and data exfiltration on an industrial scale,” the Italian company said.

The Shadowserver Foundation currently tracks more than 111,000 IP addresses vulnerable to React2Shell attacks, with more than 77,800 in the United States, followed by Germany (7,500), France (4,000), and India (2,300). According to data from GreyNoise, 547 malicious IP addresses from the US, India, UK, Singapore, and the Netherlands were found participating in exploitative activities in the past 24 hours.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDeep snow turns Yellowstone Lake into a vast white void — Earth seen from space
Next Article QuantumDiamonds unveils €152 million semiconductor testing facility
user
  • Website

Related Posts

Iran’s Infy APT resurfaces with new malware activity after years of silence

December 21, 2025

US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

December 20, 2025

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Waymo temporarily suspends service in San Francisco as robotaxis stall due to power outage

Electrical startups raise concerns as EU wateres down 2035 EV targets

Iran’s Infy APT resurfaces with new malware activity after years of silence

Google and Apple reportedly warned employees with visas to avoid traveling abroad

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.