Security
Headlines
HeadlinesLatestCVEs

Headline

North Korean Hackers Deploy EtherRAT Malware in React2Shell Exploits

Sysdig discovered North Korea-linked EtherRAT, a stealthy new backdoor using Ethereum smart contracts for C2 after exploiting the critical React2Shell vulnerability (CVE-2025-55182).

HackRead
#vulnerability#web#linux#nodejs#js#java#backdoor#rce#auth

A team of cybersecurity researchers at Sysdig, a firm specialising in protecting cloud and container-based apps, has found a new malware called EtherRAT being deployed to exploit the severe CVE-2025-55182 React2Shell vulnerability.

The discovery was made on December 5, 2025, just two days after the vulnerability was publicly revealed.

****A Maximum Severity Vulnerability****

This flaw was first disclosed on December 3, 2025, by researcher Lachlan Davidson and affects React Server Components (RSCs), including frameworks like Next.js. It is a maximum-severity issue that allows an unauthenticated attacker to perform Remote Code Execution (RCE) on a server via an unsafe deserialization flaw. CISA added this flaw to its Known Exploited Vulnerabilities (KEV) catalogue on December 5, 2025, confirming it was actively being used in attacks.

****From Basic Theft to Advanced EtherRAT****

The latest research from Sysdig TRT reveals that the danger of the React2Shell vulnerability is rapidly expanding. While early exploitation was dominated by payloads from opportunistic cryptominers and sophisticated China-nexus groups deploying credential harvesters and backdoors, Sysdig’s investigation revealed that EtherRAT represents an escalation in this activity.

EtherRAT is a persistent access implant that combines methods from at least three known campaigns into a single, previously unreported attack chain. The malware itself is unique because it uses Ethereum smart contracts for command-and-control (C2) resolution, installs five separate Linux defences to ensure it remains active, and downloads its own Node.js software directly from nodejs.org. According to researchers, this specific blend of features has never been seen before in an exploit of the React2Shell vulnerability.

****EtherRAT’s Command Centre and Attribution****

The most prominent feature of EtherRAT is its Command-and-Control (C2) centre. Instead of relying on a standard website address that could be blocked, it uses Ethereum smart contracts (code stored on a decentralised ledger). This shows its extreme resilience because the program checks nine different public connection points for the Ethereum network, using the address that the majority of them agree on. This consensus mechanism is a way to protect against a single authority shutting it down.

To guarantee a permanent backdoor, the program is designed for long-term stealth, establishing five different ways to ensure it restarts on a system. TRT also believe that the software is linked to North Korean hacking groups because of a “significant overlap with North Korea-linked ‘Contagious Interview‘ (DPRK) tooling.”

Specifically, the way EtherRAT encrypts its files closely matches the BeaverTail malware, a known North Korean tool. The researchers provided a comparison image showing that the file encryption method closely matches the North Korean-linked campaign tooling.

Image credit: Sysdig

Sysdig TRT concluded in the blog post shared with Hackread.com that the advanced design of EtherRAT “represents a significant evolution in React2Shell exploitation.”

Casey Ellis, Founder at Bugcrowd, weighed in on the significance of the EtherRAT discovery, sharing their comments with Hackread.com, stating, From an attacker’s perspective, react2shell is the kind of vulnerability that affords massive opportunity for crime, but that also has a relatively narrow window for exploitation… All of this rolls out to some very speedy and coordinated campaigns, just like the one being described here.

Mike McGuire, Senior Security Solutions Manager at Black Duck, a Burlington, Massachusetts-based provider of application security solutions, also commented on the issue, explaining, “The EtherRAT findings show once again that the gap between public disclosure and nation-state exploitation is basically zero. What stands out is the move away from quick hits like cryptomining toward persistent, stealthy access meant for long-term operations.”

“React2Shell is especially concerning because it hits the JavaScript ecosystem at the framework level, which gives attackers a broad reach. By combining a new RCE with things like blockchain-based command and control and a bundled Node.js runtime, the attackers make it much harder for defenders to spot or block them using traditional signals. In simple terms, it lets them blend in and stay hidden for longer,” McGuire added.

“The broader takeaway is that attackers will continue to pivot quickly to weaknesses deep in the web application stack. Organisations need to assume these vulnerabilities will be targeted immediately and make sure their patching processes, SBOM-driven visibility, and monitoring can keep up,” he advised.

Related news

ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories

This week’s cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons, and even software updates people trust. Tech giants and governments are racing to plug new holes while arguing over privacy and control. And researchers keep uncovering just how much of our digital life is still wide open. The new Threatsday Bulletin

React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors

React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to deliver cryptocurrency miners and an array of previously undocumented malware families, according to new findings from Huntress. This includes a Linux backdoor called PeerBlight, a reverse proxy tunnel named CowTunnel, and a Go-based

North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware

Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed critical security React2Shell flaw in React Server Components (RSC) to deliver a previously undocumented remote access trojan dubbed EtherRAT. "EtherRAT leverages Ethereum smart contracts for command-and-control (C2) resolution, deploys five independent Linux persistence mechanisms, and

⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More

It’s been a week of chaos in code and calm in headlines. A bug that broke the internet’s favorite framework, hackers chasing AI tools, fake apps stealing cash, and record-breaking cyberattacks — all within days. If you blink, you’ll miss how fast the threat map is changing. New flaws are being found, published, and exploited in hours instead of weeks. AI-powered tools meant to help developers

Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday formally added a critical security flaw impacting React Server Components (RSC) to its Known Exploited Vulnerabilities (KEV) catalog following reports of active exploitation in the wild. The vulnerability, CVE-2025-55182 (CVSS score: 10.0), relates to a case of remote code execution that could be triggered by an

Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability

Two hacking groups with ties to China have been observed weaponizing the newly disclosed security flaw in React Server Components (RSC) within hours of it becoming public knowledge. The vulnerability in question is CVE-2025-55182 (CVSS score: 10.0), aka React2Shell, which allows unauthenticated remote code execution. It has been addressed in React versions 19.0.1, 19.1.2, and 19.2.1. According

GHSA-fv66-9v8q-g76r: React Server Components are Vulnerable to RCE

### Impact There is an unauthenticated remote code execution vulnerability in React Server Components. We recommend upgrading immediately. The vulnerability is present in versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of: * [react-server-dom-webpack](https://www.npmjs.com/package/react-server-dom-webpack) * [react-server-dom-parcel](https://www.npmjs.com/package/react-server-dom-parcel) * [react-server-dom-turbopack](https://www.npmjs.com/package/react-server-dom-turbopack?activeTab=readme) ### Patches A fix was introduced in versions [19.0.1](https://github.com/facebook/react/releases/tag/v19.0.1), [19.1.2](https://github.com/facebook/react/releases/tag/v19.1.2), and [19.2.1](https://github.com/facebook/react/releases/tag/v19.2.1). If you are using any of the above packages please upgrade to any of the fixed versions immediately. If your app’s React code does not use a server, your app is not affected by this vulnerability. If your app does not use a framework, bundler, or bundler pl...

Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution

A maximum-severity security flaw has been disclosed in React Server Components (RSC) that, if successfully exploited, could result in remote code execution. The vulnerability, tracked as CVE-2025-55182, carries a CVSS score of 10.0. It allows "unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Server Function endpoints," the React Team said in

HackRead: Latest News

Top 10 Data Anonymization Solutions for 2026