Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware

Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware

Google Warns React2Shell to Spread Malware

Google Threat Intelligence Group (GTIG) has issued a warning regarding the widespread exploitation of a critical security flaw in React Server Components.

Known as React2Shell (CVE-2025-55182), this vulnerability allows attackers to take control of servers remotely without needing a password.

Since the vulnerability was disclosed on December 3, 2025, Google has observed multiple distinct hacker groups abusing the flaw.

The attackers range from state-sponsored espionage groups to cybercriminals looking for financial gain.

Threat Actors and Malware Campaigns

Google researchers have identified several campaigns targeting unpatched systems. Key observations include:

  • China-Nexus Espionage: Groups linked to China are using React2Shell to deploy backdoors and stealthy tools. One group, UNC6600, installs the MINOCAT tunneler to maintain hidden access to victim networks. Another group, UNC6603, uses an updated version of the HISONIC backdoor, which hides its traffic by communicating through legitimate services like Cloudflare.
  • Financial Cybercrime: Opportunistic attackers are using the flaw to install cryptocurrency miners. In one case, criminals deployed XMRig to generate digital currency using the victim’s server power.
  • Additional Threats: Other identified malware includes the SNOWLIGHT downloader and the COMPOOD backdoor, both used to steal data or load further malicious software.

React2Shell is rated with a maximum severity score of 10.0 (CVSS v3). It affects specific versions of React and Next.js, popular frameworks used to build modern websites. Because these tools are widely used, many organisations are currently exposed.

google

Google warns that legitimate exploit code is now publicly available, making it easier for attackers to strike.

While some early exploit tools were fake or broken, functional methods including tools that can install web shells directly into memory are now in circulation.

Security experts urge administrators to patch affected systems immediately. Organizations using Next.js or React Server Components should verify they are running secure versions to prevent unauthorized access.

IoC

Indicator Type Description
reactcdn.windowserrorapis[.]com Domain SNOWLIGHT C2 and Staging Server
82.163.22[.]139 IP Address SNOWLIGHT C2 Server
216.158.232[.]43 IP Address Staging server for sex.sh script
45.76.155[.]14 IP Address COMPOOD C2 and Payload Staging Server
df3f20a961d29eed46636783b71589c183675510737c984a11f78932b177b540 SHA256 HISONIC sample
92064e210b23cf5b94585d3722bf53373d54fb4114dca25c34e010d0c010edf3 SHA256 HISONIC sample
0bc65a55a84d1b2e2a320d2b011186a14f9074d6d28ff9120cb24fcc03c3f696 SHA256 ANGRYREBEL.LINUX sample
13675cca4674a8f9a8fabe4f9df4ae0ae9ef11986dd1dcc6a896912c7d527274 SHA256 XMRIG Downloader Script (filename: sex.sh)
7f05bad031d22c2bb4352bf0b6b9ee2ca064a4c0e11a317e6fedc694de37737a SHA256 SNOWLIGHT sample (filename: linux_amd64)
776850a1e6d6915e9bf35aa83554616129acd94e3a3f6673bd6ddaec530f4273 SHA256 MINOCAT sample

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link