Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware

Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware

Posted on December 13, 2025December 13, 2025 By CWS

Google Risk Intelligence Group (GTIG) has issued a warning relating to the widespread exploitation of a vital safety flaw in React Server Elements.

Often known as React2Shell (CVE-2025-55182), this vulnerability permits attackers to take management of servers remotely without having a password.

Because the vulnerability was disclosed on December 3, 2025, Google has noticed a number of distinct hacker teams abusing the flaw.

The attackers vary from state-sponsored espionage teams to cybercriminals in search of monetary achieve.

Risk Actors and Malware Campaigns

Google researchers have recognized a number of campaigns concentrating on unpatched methods. Key observations embrace:

China-Nexus Espionage: Teams linked to China are utilizing React2Shell to deploy backdoors and stealthy instruments. One group, UNC6600, installs the MINOCAT tunneler to keep up hidden entry to sufferer networks. One other group, UNC6603, makes use of an up to date model of the HISONIC backdoor, which hides its site visitors by speaking via legit providers like Cloudflare.

Monetary Cybercrime: Opportunistic attackers are utilizing the flaw to put in cryptocurrency miners. In a single case, criminals deployed XMRig to generate digital foreign money utilizing the sufferer’s server energy.

Further Threats: Different recognized malware consists of the SNOWLIGHT downloader and the COMPOOD backdoor, each used to steal knowledge or load additional malicious software program.

React2Shell is rated with a most severity rating of 10.0 (CVSS v3). It impacts particular variations of React and Subsequent.js, widespread frameworks used to construct trendy web sites. As a result of these instruments are broadly used, many organisations are at the moment uncovered.

Google warns that legit exploit code is now publicly accessible, making it simpler for attackers to strike.

Whereas some early exploit instruments have been faux or damaged, useful strategies together with instruments that may set up internet shells immediately into reminiscence are actually in circulation.

Safety consultants urge directors to patch affected methods instantly. Organizations utilizing Subsequent.js or React Server Elements ought to confirm they’re working safe variations to forestall unauthorized entry.

IoC

IndicatorTypeDescriptionreactcdn.windowserrorapis[.]comDomainSNOWLIGHT C2 and Staging Server82.163.22[.]139IP AddressSNOWLIGHT C2 Server216.158.232[.]43IP AddressStaging server for intercourse.sh script45.76.155[.]14IP AddressCOMPOOD C2 and Payload Staging Serverdf3f20a961d29eed46636783b71589c183675510737c984a11f78932b177b540SHA256HISONIC sample92064e210b23cf5b94585d3722bf53373d54fb4114dca25c34e010d0c010edf3SHA256HISONIC sample0bc65a55a84d1b2e2a320d2b011186a14f9074d6d28ff9120cb24fcc03c3f696SHA256ANGRYREBEL.LINUX sample13675cca4674a8f9a8fabe4f9df4ae0ae9ef11986dd1dcc6a896912c7d527274SHA256XMRIG Downloader Script (filename: intercourse.sh)7f05bad031d22c2bb4352bf0b6b9ee2ca064a4c0e11a317e6fedc694de37737aSHA256SNOWLIGHT pattern (filename: linux_amd64)776850a1e6d6915e9bf35aa83554616129acd94e3a3f6673bd6ddaec530f4273SHA256MINOCAT pattern

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Exploiting, Google, Groups, Hacker, Malware, Multiple, React2Shell, Spread, Warns

Post navigation

Previous Post: Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers
Next Post: 7 Best Security Awareness Training Platforms For MSPs in 2026

Related Posts

Volkswagen Allegedly Hit by Ransomware Attack as 8Base Claims Sensitive Data Theft Volkswagen Allegedly Hit by Ransomware Attack as 8Base Claims Sensitive Data Theft Cyber Security News
3 Steps to Beat Burnout in Your SOC and Solve Incidents Faster  3 Steps to Beat Burnout in Your SOC and Solve Incidents Faster  Cyber Security News
Hackers Scanning Cisco ASA Devices to Exploit Vulnerabilities from 25,000 IPs Hackers Scanning Cisco ASA Devices to Exploit Vulnerabilities from 25,000 IPs Cyber Security News
New Kali Tool llm-tools-nmap Uses Nmap For Network Scanning Capabilities New Kali Tool llm-tools-nmap Uses Nmap For Network Scanning Capabilities Cyber Security News
Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users Cyber Security News
New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News