Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
ClickFix Integrates Old Open-Source Python S Evolves SOCKS5
May 13, 2026
Critical SandboxJS Escape Vulnerability Allows Host Takeover
May 13, 2026
iOS 26.5 Brings End-to-end Encrypted RCS Messaging Between iPhone
May 13, 2026
Home/CyberSecurity News/Hackers Launched 8.1 Million React2Shell Attack Sessions Vulnerability
CyberSecurity News

Hackers Launched 8.1 Million React2Shell Attack Sessions Vulnerability

The React2Shell Attack Sessions Vulnerabilitytargeting the flaw since its initial disclosure. According to GreyNoise Observation Grid data, daily attack volumes have stabilized at 300,000–400,000...

Sarah simpson
Sarah simpson
January 8, 2026 2 Min Read
21 0

The React2Shell Attack Sessions Vulnerabilitytargeting the flaw since its initial disclosure.

According to GreyNoise Observation Grid data, daily attack volumes have stabilized at 300,000–400,000 sessions since peaking above 430,000 in late December, indicating sustained, coordinated exploitation.

Over 8.1 <a href=Million React2Shell Attackhave been seen since the start.”>
Over 8.1 million sessions have been seen since the start.

Scale of the Exploitation Campaign

The campaign’s infrastructure footprint reveals a sophisticated, distributed operation. Researchers have identified 8,163 unique source IP addresses spanning 1,071 autonomous systems (ASNs) across 101 countries.

This geographic dispersion underscores the vulnerability’s appeal across diverse threat actor ecosystems, from exploitative botnets to advanced persistent threat groups. AWS and other major cloud providers dominate the attack infrastructure.

Amazon Web Services alone accounts for over one-third of observed exploitation traffic, with the top 15 ASNs comprising approximately 60% of all source IPs.

This reflects attackers’ preference for leveraging legitimate cloud infrastructure to mask malicious activity. Attackers have created over 70,000 unique payloads, demonstrating continuous experimentation and refinement.

unique IPs observed
unique IPs observed

Network fingerprint analysis reveals 700 distinct JA4H hashes (HTTP client fingerprints) and 340 unique JA4T hashes (TCP stack fingerprints), indicating varied tooling and delivery mechanisms.

Payload Diversity and Attack Patterns

Exploitation follows a predictable two-stage approach. Initial reconnaissance probes validate command execution via simple PowerShell arithmetic operations before proceeding to deliver an encoded payload.

Stage-two exploits employ AMSI bypass techniques, enabling attackers to execute additional malicious scripts while evading antivirus detection.

Organizations remain exposed if unpatched. Nearly 50% of observed source IPs were first observed after July 2025, indicating a recent infrastructure allocation and rapid IP rotation.

Static IP blocklists are insufficient to address this campaign’s scale and velocity. Defenders should implement dynamic blocking through GreyNoise’s continuously updated threat intelligence feeds.

Endpoint monitoring should focus on detecting PowerShell execution patterns, encoded commands, and AMSI modifications via reflection.

Organizations managing exposed React Server Components should treat this as an active, ongoing threat requiring immediate patching and network-level protection.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitHackerPatchThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

ChatGPT Health: Secure Platform for Your Private Health Queries

Next Post

Cisco Small Business Switches Hit by Global DNS Outage Crash

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Microsoft Releases Windows 11 Cumulative Update 25H
May 13, 2026
Discover the Top 10 Best Data Loss Prevention Software
May 13, 2026
Microsoft Teams Vulnerability Enables Spoofing Attacks
May 13, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us