Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/Threats/Attackers Exploit React2Shell Vulnerability in IT Sect
Threats

Attackers Exploit React2Shell Vulnerability in IT Sect

A critical vulnerability, identified as CVE-2025-55182 and dubbed React2Shell, is now under active exploitation by threat actors. They are specifically targeting organizations across the insurance,...

David kimber
David kimber
January 27, 2026 3 Min Read
0 0

A critical vulnerability, identified as CVE-2025-55182 and dubbed React2Shell, is now under active exploitation by threat actors. They are specifically targeting organizations across the insurance, e-commerce, and IT sectors.

This flaw exists in the Flight protocol that handles client-server communication for React Server Components, allowing attackers to run unauthorized code on vulnerable servers.

The vulnerability originates from insecure deserialization, where servers accept client data without proper verification. The attacks primarily deliver the XMRig cryptocurrency miner, alongside several dangerous botnets and remote access tools.

The exploitation campaigns have shown remarkable speed and sophistication.

BI.ZONE analysts noted that adversaries can weaponize critical vulnerabilities within hours of their disclosure, even though many such security flaws never see widespread exploitation in real-world scenarios.

The attacks targeting Russian entities specifically deployed RustoBot and Kaiji botnets, while campaigns aimed at other regions distributed a broader range of malware including CrossC2 implants, Tactical RMM, VShell backdoors, and EtherRAT trojans.

React2Shell affects multiple versions of React Server Component packages, including react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack in versions 19.0, 19.1.0, 19.1.1, and 19.2.0.

Patches have been released in versions 19.0.1, 19.1.2, and 19.2.1. BI.ZONE researchers identified that simply fixing the vulnerability is insufficient.

Organizations must also assess their systems for indicators of successful exploitation and post-exploitation activity, as these attacks often involve diverse malicious operations.

Beyond patching, developers should verify their Next.js versions and dependencies, rebuild projects after updates, and check lock files to confirm vulnerable package versions have been removed.

Experts recommend restricting experimental React Server Components features in production environments unless covered by current security patches.

Infection Mechanism and Malware Deployment

The attack chain begins when threat actors exploit React2Shell to execute commands inside compromised containers. After gaining initial access, attackers download and execute Bash scripts from remote servers to deploy malicious payloads.

The wocaosinm.sh script, for instance, downloads architecture-specific ELF executables identified as the Kaiji botnet, which performs DDoS attacks and establishes persistence through systemd services, crontab tasks, and modified system utilities.

Script implementing architecture-specific malware delivery (Source - Medium)
Script implementing architecture-specific malware delivery (Source – Medium)

Another deployment method involves the setup2.sh script, which installs XMRig version 6.24.0 by downloading a compressed archive containing the miner configuration and executable.

The alive.sh script then terminates any process consuming 40% CPU or more, except for the XMRig miner itself and other whitelisted processes.

Fragment of setup2.sh (Source - Medium)
Fragment of setup2.sh (Source – Medium)

Attackers also use DNS tunneling through tools like nslookup to exfiltrate command execution results, sending information to external domains using encoded subdomain queries.

The CrossC2 framework payloads for Cobalt Strike represent another sophisticated attack vector.

These UPX-packed executables contain encrypted configurations embedded at the end of the file, decrypted using AES-128-CBC algorithm.

Fragment of check.sh (Source - Medium)
Fragment of check.sh (Source – Medium)

The check.sh script saves these payloads as rsyslo and creates a systemd service for persistence, disguising the malware as “Rsyslo AV Agent Service” to avoid detection.

The EtherRAT malware demonstrates exceptional persistence capabilities by establishing five different methods: systemd services, XDG Autostart entries, crontab tasks, .bashrc modifications, and .profile alterations.

This JavaScript-based malware retrieves its command-and-control server address from an Ethereum smart contract, making traditional blocking methods less effective.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitMalwarePatchSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent

Next Post

Hackers Use SEO Poisoning to Attack Users Leveraging Looking

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us