Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
React2Shell Attacks Linked to North Korean Hackers

React2Shell Attacks Linked to North Korean Hackers

Posted on December 9, 2025December 9, 2025 By CWS

Among the assaults exploiting the just lately emerged React vulnerability dubbed React2Shell seem to have been performed by North Korean menace actors, in response to cybersecurity agency Sysdig.

The React2Shell vulnerability, formally tracked as CVE-2025-55182, will be exploited for unauthenticated distant code execution. The flaw impacts model 19 of the React open supply library for creating utility person interfaces.

Along with React, CVE-2025-55182 impacts different associated frameworks, together with Subsequent.js, Waku, React Router, and RedwoodSDK.

Whereas React powers tens of millions of purposes, the precise variety of susceptible cases seems to be comparatively small, with the Shadowserver Basis seeing roughly 70,000 affected techniques.

The existence of React2Shell got here to gentle on December 3 and in-the-wild exploitation commenced shortly after. 

[ Read: Cloudflare Outage Caused by React2Shell Mitigations ]

Primarily based on the at the moment accessible data, China-linked menace teams have been the primary to take advantage of the vulnerability. Exploitation quickly surged, with the cybersecurity group seeing assaults involving AWS credential theft, malware deployment (botnets), and cryptocurrency miners.

Sysdig has noticed refined assaults involving the deployment of EtherRAT, which the corporate described as a persistent entry implant “that mixes strategies from not less than three documented campaigns right into a single, beforehand unreported assault chain.”Commercial. Scroll to proceed studying.

“EtherRAT leverages Ethereum sensible contracts for command-and-control (C2) decision, deploys 5 unbiased Linux persistence mechanisms, and downloads its personal Node.js runtime from nodejs.org,” the safety agency defined. “This mix of capabilities has not been beforehand noticed in React2Shell exploitation.”

Sysdig’s evaluation unearthed overlaps with the North Korea-linked marketing campaign dubbed Contagious Interview, through which menace actors ship malware to individuals related to cryptocurrency and blockchain applied sciences via faux job interviews. The final word purpose of the marketing campaign is the theft of cryptocurrency from victims. 

Within the EtherRAT assault, React2Shell is exploited to execute a shell command for downloading and executing a shell script designed to deploy a JavaScript implant. This implant is a dropper that decrypts the principle payload, EtherRAT. 

“The encrypted loader sample utilized in EtherRAT intently matches the DPRK-affiliated BeaverTail malware used within the Contagious Interview campaigns,” Sysdig mentioned.

It added, “Notably, whereas Lazarus Group and different DPRK-affiliated menace actors traditionally bundle Node.js with their payloads, the pattern we recognized downloads Node.js from the official nodejs.org distribution. This represents a big evolution in tradecraft: buying and selling a smaller payload dimension for diminished detection threat.”

Whereas the uncovered proof appears to level to Lazarus or a unique North Korean menace actor exploiting React2Shell because the preliminary supply vector (as a substitute for faux job interviews), the safety agency admits it’s additionally potential that “one other refined actor could also be combining strategies from a number of documented campaigns to complicate attribution”.

Associated: 5 Plead Responsible in US to Serving to North Korean IT Employees

Associated: North Korean Hackers Goal at European Drone Corporations

Security Week News Tags:Attacks, Hackers, Korean, Linked, North, React2Shell

Post navigation

Previous Post: Microsoft Teams New feature Allows Users to Flag Malicious Calls
Next Post: See Cyber Threats to Your Industry and Region in Just 2 Seconds

Related Posts

Zero Networks Raises  Million for Microsegmentation Solution Zero Networks Raises $55 Million for Microsegmentation Solution Security Week News
Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments Security Week News
Veeam to Acquire Data Security Firm Securiti AI for .7 Billion Veeam to Acquire Data Security Firm Securiti AI for $1.7 Billion Security Week News
Irregular Raises  Million for AI Security Testing Lab Irregular Raises $80 Million for AI Security Testing Lab Security Week News
Unbound Raises  Million to Secure Gen-AI Adoption Unbound Raises $4 Million to Secure Gen-AI Adoption Security Week News
Honoring Our Veteran Readers: Thank You for Your Service Honoring Our Veteran Readers: Thank You for Your Service Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News