Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New PCPcat Exploiting React2Shell Vulnerability to compromise 59,000+ Servers

Posted on December 15, 2025December 15, 2025 By CWS

A brand new malware marketing campaign referred to as PCPcat has efficiently compromised greater than 59,000 servers in below 48 hours via focused exploitation of crucial vulnerabilities in Subsequent.js and React frameworks.

The malware targets Subsequent.js deployments by exploiting two crucial vulnerabilities, CVE-2025-29927 and CVE-2025-66478, which permit distant code execution with out authentication.

The assault makes use of prototype air pollution and command injection methods to execute dangerous instructions on susceptible servers.

The marketing campaign has proven a 64.6 % success price, which is unusually excessive for such operations. PCPcat scans public-facing Subsequent.js purposes at scale, testing 2,000 targets in every batch and working these scans each 30 to 60 minutes.

The malware operates by way of a command-and-control server in Singapore that orchestrates the operation throughout three major ports.

Port 666 serves because the distribution heart for dangerous payloads, port 888 handles reverse tunnel connections, and port 5656 runs the primary management server that assigns targets and collects stolen knowledge.

Throughout lively monitoring of Docker honeypots, the marketing campaign found the operation’s full infrastructure via reconnaissance of the command and management server.

Safety analysts at Beelzebub recognized that the malware first assessments targets with a easy command to verify if they’re susceptible earlier than launching the complete assault chain.

As soon as a susceptible server is discovered, it extracts surroundings recordsdata, cloud credentials, SSH keys, and command historical past recordsdata.

The stolen info will get despatched again to the management server via easy HTTP requests that require no authentication.

After stealing credentials, the malware makes an attempt to put in further instruments for long-term entry. It downloads a script that units up GOST proxy software program and FRP reverse tunneling instruments on the compromised server.

These instruments create hidden channels that enable attackers to take care of entry even after the preliminary vulnerability is patched.

Exploit Mechanism and Code Execution

The assault works by sending a specifically crafted JSON payload to susceptible Subsequent.js servers.

This payload manipulates the JavaScript prototype chain and injects instructions into the kid course of execution perform.

The malware makes use of the next construction:-

payload = {
“then”: “$1:__proto__:then”,
“standing”: “resolved_model”,
“_response”: {
“_prefix”: “var res=course of.mainModule.require(‘child_process’)
.execSync(‘COMMAND_HERE’).toString();”
}
}

This payload forces the server to run any command the attacker desires. The outcomes get returned via a specifically formatted redirect header, permitting the malware to extract knowledge with out elevating instant suspicion.

The malware then systematically searches for invaluable recordsdata like AWS credentials within the .aws folder, Docker configuration recordsdata, Git credentials, and bash historical past containing just lately used instructions.

To take care of persistence, the malware creates a number of system companies that restart robotically if stopped or if the server reboots.

These companies run the proxy and scanning instruments repeatedly, maintaining the compromised server lively within the botnet. The set up occurs in a number of areas to make sure a minimum of one copy survives safety cleanup efforts.

Community directors can detect this exercise by monitoring connections to the command server IP handle 67.217.57.240 on ports 666, 888, and 5656, in search of systemd companies with names containing pcpcat, and checking for uncommon outbound connections carrying JSON knowledge containing surroundings variables or credentials.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Compromise, Exploiting, PCPcat, React2Shell, Servers, Vulnerability

Post navigation

Previous Post: Militant Groups Are Experimenting With AI, and the Risks Are Expected to Grow
Next Post: Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats

Related Posts

Linux Battery Utility Flaw Lets Hackers Bypass Authentication and Tamper System Settings Cyber Security News
U.S. Government Seizes Online Marketplaces Used to Sell Fraudulent Identity Documents to Cybercriminals Cyber Security News
Microsoft Releases Emergency Fix for BitLocker Recovery Issue Cyber Security News
Hundreds of Free VPN Apps for Both Android and iOS Leaks Users Personal Data Cyber Security News
Chinese Hackers Organization Influence U.S. Government Policy on International Issues Cyber Security News
HubSpot’s Jinjava Engine Vulnerability Exposes Thousands of Websites to RCE Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Badges, Bytes and Blackmail
  • Hugging Face Abused to Deploy Android RAT
  • ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
  • Critical Ivanti Endpoint Manager RCE Vulnerabilities Actively Exploited in Attacks
  • Education-Themed Malicious Domains Linked to Bulletproof Hosting Infrastructure Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Badges, Bytes and Blackmail
  • Hugging Face Abused to Deploy Android RAT
  • ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
  • Critical Ivanti Endpoint Manager RCE Vulnerabilities Actively Exploited in Attacks
  • Education-Themed Malicious Domains Linked to Bulletproof Hosting Infrastructure Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark