Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

React2Shell Attacks Linked to North Korean Hackers

Posted on December 9, 2025December 9, 2025 By CWS

Among the assaults exploiting the just lately emerged React vulnerability dubbed React2Shell seem to have been performed by North Korean menace actors, in response to cybersecurity agency Sysdig.

The React2Shell vulnerability, formally tracked as CVE-2025-55182, will be exploited for unauthenticated distant code execution. The flaw impacts model 19 of the React open supply library for creating utility person interfaces.

Along with React, CVE-2025-55182 impacts different associated frameworks, together with Subsequent.js, Waku, React Router, and RedwoodSDK.

Whereas React powers tens of millions of purposes, the precise variety of susceptible cases seems to be comparatively small, with the Shadowserver Basis seeing roughly 70,000 affected techniques.

The existence of React2Shell got here to gentle on December 3 and in-the-wild exploitation commenced shortly after. 

[ Read: Cloudflare Outage Caused by React2Shell Mitigations ]

Primarily based on the at the moment accessible data, China-linked menace teams have been the primary to take advantage of the vulnerability. Exploitation quickly surged, with the cybersecurity group seeing assaults involving AWS credential theft, malware deployment (botnets), and cryptocurrency miners.

Sysdig has noticed refined assaults involving the deployment of EtherRAT, which the corporate described as a persistent entry implant “that mixes strategies from not less than three documented campaigns right into a single, beforehand unreported assault chain.”Commercial. Scroll to proceed studying.

“EtherRAT leverages Ethereum sensible contracts for command-and-control (C2) decision, deploys 5 unbiased Linux persistence mechanisms, and downloads its personal Node.js runtime from nodejs.org,” the safety agency defined. “This mix of capabilities has not been beforehand noticed in React2Shell exploitation.”

Sysdig’s evaluation unearthed overlaps with the North Korea-linked marketing campaign dubbed Contagious Interview, through which menace actors ship malware to individuals related to cryptocurrency and blockchain applied sciences via faux job interviews. The final word purpose of the marketing campaign is the theft of cryptocurrency from victims. 

Within the EtherRAT assault, React2Shell is exploited to execute a shell command for downloading and executing a shell script designed to deploy a JavaScript implant. This implant is a dropper that decrypts the principle payload, EtherRAT. 

“The encrypted loader sample utilized in EtherRAT intently matches the DPRK-affiliated BeaverTail malware used within the Contagious Interview campaigns,” Sysdig mentioned.

It added, “Notably, whereas Lazarus Group and different DPRK-affiliated menace actors traditionally bundle Node.js with their payloads, the pattern we recognized downloads Node.js from the official nodejs.org distribution. This represents a big evolution in tradecraft: buying and selling a smaller payload dimension for diminished detection threat.”

Whereas the uncovered proof appears to level to Lazarus or a unique North Korean menace actor exploiting React2Shell because the preliminary supply vector (as a substitute for faux job interviews), the safety agency admits it’s additionally potential that “one other refined actor could also be combining strategies from a number of documented campaigns to complicate attribution”.

Associated: 5 Plead Responsible in US to Serving to North Korean IT Employees

Associated: North Korean Hackers Goal at European Drone Corporations

Security Week News Tags:Attacks, Hackers, Korean, Linked, North, React2Shell

Post navigation

Previous Post: Microsoft Teams New feature Allows Users to Flag Malicious Calls
Next Post: See Cyber Threats to Your Industry and Region in Just 2 Seconds

Related Posts

Google’s $32 Billion Wiz Deal Draws DOJ Antitrust Scrutiny: Report Security Week News
Tonic Security Launches With $7 Million in Seed Funding Security Week News
Realm.Security Raises $15 Million in Series A Funding Security Week News
Recently Disrupted DanaBot Leaked Valuable Data for 3 Years Security Week News
Victoria’s Secret Website Taken Offline After Cyberattack Security Week News
Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws
  • Users Report Teams and Access Issues
  • Windows Cloud Files Mini Filter Driver 0-Day Vulnerability Exploited in the Wild to Escalate Privileges
  • UK Sanctions Russian and Chinese Firms Suspected of Being ‘Malign Actors’ in Information Warfare
  • Adobe Patches Nearly 140 Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws
  • Users Report Teams and Access Issues
  • Windows Cloud Files Mini Filter Driver 0-Day Vulnerability Exploited in the Wild to Escalate Privileges
  • UK Sanctions Russian and Chinese Firms Suspected of Being ‘Malign Actors’ in Information Warfare
  • Adobe Patches Nearly 140 Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark