#react2shell-cve-2025-55182

[ follow ]
Information security
fromThe Hacker News
3 days ago

TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure

A worm-driven TeamPCP campaign exploited exposed cloud-native services and React2Shell to build malicious infrastructure for data theft, extortion, ransomware, and crypto mining.
fromThe Hacker News
1 week ago

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

Datadog Security Labs said it observed threat actors associated with the recent React2Shell ( CVE-2025-55182, CVSS score: 10.0) exploitation using malicious NGINX configurations to pull off the attack. "The malicious configuration intercepts legitimate web traffic between users and websites and routes it through attacker-controlled backend servers," security researcher Ryan Simon said. "The campaign targets Asian TLDs (.in, .id, .pe, .bd, .th), Chinese hosting infrastructure (Baota Panel), and government and educational TLDs (.edu, .gov)."
Information security
Information security
fromThe Hacker News
1 month ago

Weekly Recap: IoT Exploits, Wallet Breaches, Rogue Extensions, AI Abuse & More

Steady, quiet exploitation of trusted mechanisms—updates, extensions, logins, and messages—drives long-lived attacks like RondoDox and supply-chain compromises.
Information security
fromInfoWorld
1 month ago

React2Shell is the Log4j moment for front end development

A Flight protocol validation failure in React Server Components and Next.js (React2Shell, CVE-2025-55182) enables unauthenticated remote code execution and rapid ransomware deployment.
fromBleepingComputer
2 months ago

North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks

A new malware implant called EtherRAT, deployed in a recent React2Shell attack, runs five separate Linux persistence mechanisms and leverages Ethereum smart contracts for communication with the attacker. Researchers at cloud security company Sysdig believe that the malware aligns with North Korea's tools used in Contagious Interview campaigns. They recovered EtherRAT from a compromised Next.js application just two days after the disclosure of the critical React2Shell vulnerability tracked as CVE-2025-55182.
Information security
[ Load more ]