top of page
perceptive_background_267k.jpg

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

Published:

16 december 2025 om 08:21:00

Alert date:

16 december 2025 om 09:01:26

Source:

thehackernews.com

Click to open the original link from this advisory

Web Technologies, Zero-Day Vulnerabilities, Ransomware & Malware, Data Breach & Exfiltration

The React2Shell vulnerability is being actively exploited by threat actors to deploy malware families including KSwapDoor and ZnDoor on Linux systems. KSwapDoor is described as a professionally engineered remote access tool designed with stealth capabilities. The exploitation campaign has been documented by security researchers from Palo Alto Networks Unit 42 and NTT Security, indicating ongoing active threats targeting Linux environments through this vulnerability.

Technical details

React2Shell vulnerability (CVE-2025-55182) is being exploited to deploy Linux backdoors including KSwapDoor and ZnDoor. KSwapDoor builds internal mesh networks for compromised server communication, uses military-grade encryption, features a sleeper mode for firewall bypass, and impersonates legitimate Linux kernel swap daemon. ZnDoor has been active since December 2023 and supports commands for shell execution, file operations, system information gathering, SOCKS5 proxy, and port forwarding. Attack chains involve running bash commands to fetch payloads from remote servers using wget. Multiple China-nexus threat groups have weaponized the vulnerability to deliver various payloads. Attacks use Cloudflare Tunnel endpoints for evasion and target cloud metadata services for credential harvesting.

Mitigation steps:

Organizations should patch CVE-2025-55182 immediately, monitor for suspicious bash commands fetching payloads via wget, watch for Cloudflare Tunnel endpoint usage, implement monitoring for unauthorized access to cloud metadata services, check for unauthorized SSH key modifications and root login enablement, scan for presence of RMM tools like MeshAgent, monitor for credential harvesting tools like TruffleHog and Gitleaks, and verify system integrity to detect Linux kernel swap daemon impersonation.

Affected products:

React Server Components
Next.js
Linux systems

Related links:

Related CVE's:

Related threat actors:

IOC's:

45.76.155[.]14, 67.217.57[.]240:888, *.trycloudflare.com

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page