Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Log4Shell Downloaded 40 Million Times in 2025

December 10, 2025

India Orders Phone Makers to Pre-Install Government App to Tackle Telecom Fraud

December 10, 2025

Malicious VS Code Extensions Deploy Advanced Infostealer

December 10, 2025
Facebook X (Twitter) Instagram
Wednesday, December 10
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»React2Shell Exploit Campaigns Tied to North Korean Cyber Tactics
News

React2Shell Exploit Campaigns Tied to North Korean Cyber Tactics

Team-CWDBy Team-CWDDecember 9, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Security researchers at Sysdig have observed new campaigns exploiting React2Shell which appear to have the hallmarks of North Korean hackers.

React2Shell is a remote code execution vulnerability in React Server Components (RSCs). Tracked as CVE-2025-55182, the flaw has a maximum severity rating with a CVSS score of 10.0.

Publicly disclosed on December 3, the vulnerability impacts version 19 of the React open source library for creating application user interfaces as well as many other related frameworks, including Next.js, Waku, React Router and RedwoodSDK.

Quickly after it was made public, Amazon Web Services (AWS) confirmed that threat groups including Earth Lamia and Jackpot Panda, both linked to Chinese state interests, were among those launching exploitation attempts.

Other threat actors were also observed exploiting React2Shell, including opportunistic actors installing cryptocurrency miners (primarily XMRig) and credential harvesters targeting AWS configuration files and environment variables.

Now, the Sysdig Threat Research Team (TRT) said they have discovered a novel implant from a compromised Next.js application that delivers EtherRAT.

The Sysdig TRT’s analysis, published on December 8, reveals significant overlap with tooling from North Korea-linked campaign cluster dubbed ‘Contagious Interview.’ This suggests either North Korean actors have pivoted to exploiting React2Shell or that sophisticated tool-sharing is occurring between nation-state groups.

React2Shell-EtherRAT Attack Chain Explained

EtherRAT is a remote access trojan (RAT) that leverages Ethereum smart contracts for command-and-control (C2) resolution, deploys five independent Linux persistence mechanisms and downloads its own Node.js runtime from nodejs.org.

“Rather than hardcoding a C2 server address, which can be blocked or seized, the malware queries an on-chain contract to retrieve the current C2 URL,” explained the Sysdig report.

The attack chain of the malicious campaign leveraging the React2Shell exploit follows four stages, each designed to establish persistent, evasive control over the compromised system:

  1. Initial Access: A base64-encoded shell command executes via React2Shell, deploying a persistent downloader that fetches a malicious script (s.sh) using curl/wget/python3 fallbacks and a 300-second retry loop
  2. Deployment: The downloaded script (s.sh) installs Node.js from nodejs.org (to avoid detection), creates hidden directories, and drops an encrypted payload and an obfuscated JavaScript dropper, then self-deletes
  3. Dropper: The JavaScript dropper (.kxnzl4mtez.js) decrypts the main payload using AES-256-CBC with hardcoded keys, writes the decrypted implant to disk, and executes it via the downloaded Node.js runtime
  4. Implant: The final payload establishes a persistent backdoor with blockchain-based C2, five redundancy mechanisms for persistence, and automatic payload updates, ensuring long-term access

Signs of Nation-State Groups’ Sophistication or Cooperation

These campaigns show similarities from multiple documented campaigns, including North Korean-linked campaigns.

For instance, the encrypted loader pattern used in these EtherRAT campaigns closely matches the North Korean-affiliated BeaverTail malware used in the Contagious Interview campaigns.

Sysdig noted that Google Threat Intelligence Group (GTIG) recently attributed the use of BeaverTail malware and blockchain-based C2 techniques to the North Korean-associated threat actor UNC5342.

“However, without direct code overlap, we cannot confirm the threat actor behind EtherRAT is the same. Given some of the significant differences listed above, this may represent shared techniques across multiple Democratic People’s Republic of Korea-affiliated (DPRK) threat groups,” the Sysdig researchers wrote.

“Alternatively, while DPRK actors may have adopted React2Shell as a new initial access vector, it’s possible another sophisticated actor may be combining techniques from multiple documented campaigns to complicate attribution,” they added.

If the attribution is confirmed, these new campaigns represent a significant evolution in tradecraft, where North Korean actors trade a smaller payload size for reduced detection risk.

“While Lazarus Group and other North Korean-linked threat actors historically bundle Node.js with their payloads, the sample we identified downloads Node.js from the official nodejs.org distribution,” the researchers explained.

According to Sysdig researchers, EtherRAT marks a “significant evolution in React2Shell exploitation,” shifting away from the typical opportunistic cryptomining and credential theft toward “persistent, stealthy access designed for long-term operations.”

The team highlighted that the malware’s “combination of blockchain-based C2, aggressive multi-vector persistence, and a payload update mechanism” reflects a level of sophistication “not previously observed in React2Shell payloads.” This suggests a more calculated and resilient threat model, they noted.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWhy the New AI Browsers War is a Nightmare for Security Teams
Next Article Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More
Team-CWD
  • Website

Related Posts

News

Log4Shell Downloaded 40 Million Times in 2025

December 10, 2025
News

India Orders Phone Makers to Pre-Install Government App to Tackle Telecom Fraud

December 10, 2025
News

Malicious VS Code Extensions Deploy Advanced Infostealer

December 10, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

What is it, and how do I get it off my device?

September 11, 2025

Look out for phony verification pages spreading malware

September 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.