Over 8.1 Million Attacks Exploit React2Shell Vulnerability; Urgent Patch Recommended

Unprecedented Surge: Over 8.1 Million Attacks Target React2Shell Vulnerability

The cybersecurity landscape is witnessing an alarming escalation in attacks exploiting the React2Shell vulnerability, officially designated as CVE-2025-55182. Since its disclosure, threat actors have initiated over 8.1 million attack sessions, underscoring the critical nature of this security flaw.

Understanding React2Shell (CVE-2025-55182):

React2Shell is a critical remote code execution (RCE) vulnerability found in React Server Components, particularly affecting React versions 19.x and Next.js versions 15.x and 16.x that utilize the App Router feature. This flaw allows unauthenticated attackers to execute arbitrary code on the server by sending specially crafted HTTP requests, posing a significant risk to unpatched systems.

Scale and Persistence of Exploitation:

Data from GreyNoise Observation Grid reveals that daily attack volumes have stabilized between 300,000 and 400,000 sessions, following a peak of over 430,000 in late December. This sustained level of exploitation indicates a coordinated and persistent effort by cybercriminals to leverage this vulnerability.

Global Distribution of Attack Infrastructure:

The widespread nature of these attacks is evident in the diverse infrastructure employed:

– Unique Source IP Addresses: Over 8,163 distinct IP addresses have been identified, spanning 1,071 autonomous systems (ASNs) across 101 countries.

– Cloud Service Utilization: Major cloud providers, notably Amazon Web Services (AWS), are being exploited to launch attacks. AWS alone accounts for more than one-third of the observed exploitation traffic, with the top 15 ASNs comprising approximately 60% of all source IPs. This trend highlights attackers’ preference for using legitimate cloud infrastructure to mask their malicious activities.

Diversity and Evolution of Attack Payloads:

The sophistication of the attacks is further demonstrated by the creation of over 70,000 unique payloads, reflecting continuous experimentation and refinement by threat actors. Network fingerprint analysis has identified:

– 700 Distinct JA4H Hashes: These represent varied HTTP client fingerprints.

– 340 Unique JA4T Hashes: These correspond to different TCP stack fingerprints.

Such diversity indicates the use of varied tools and delivery mechanisms, complicating detection and mitigation efforts.

Typical Attack Methodology:

The exploitation process generally follows a two-stage approach:

1. Initial Reconnaissance: Attackers send probes to validate command execution capabilities, often using simple PowerShell arithmetic operations.

2. Payload Delivery: Upon successful reconnaissance, encoded payloads are delivered. These often employ Antimalware Scan Interface (AMSI) bypass techniques, allowing the execution of additional malicious scripts while evading antivirus detection.

Emergence of Sophisticated Malware Campaigns:

Beyond the sheer volume of attacks, the nature of the threats has evolved:

– State-Sponsored Espionage: Groups linked to nation-states have been observed exploiting React2Shell to deploy advanced malware. For instance, North Korean hackers have utilized this vulnerability to deploy EtherRAT, a sophisticated remote access trojan that leverages Ethereum smart contracts for resilient command-and-control infrastructure.

– China-Nexus Groups: Threat actors associated with China have been actively exploiting React2Shell to deploy backdoors and stealthy tools, such as the MINOCAT tunneler, to maintain hidden access to victim networks.

– Emergence of ZnDoor Malware: A previously unknown malware, ZnDoor, has been identified exploiting React2Shell to compromise network devices, particularly targeting organizations in Japan. ZnDoor operates as a fully featured remote access trojan with comprehensive system control capabilities, including file operations, shell execution, system enumeration, and network tunneling.

Recommendations for Mitigation:

Given the scale and sophistication of these attacks, organizations must adopt a multi-faceted approach to mitigate the risks associated with React2Shell:

1. Immediate Patching: Ensure that all systems running React 19.x and Next.js 15.x/16.x are updated to the latest versions where the vulnerability has been addressed.

2. Dynamic Threat Intelligence: Utilize continuously updated threat intelligence feeds to implement dynamic blocking of malicious IPs and domains.

3. Enhanced Endpoint Monitoring: Focus on detecting unusual PowerShell execution patterns, encoded commands, and modifications to AMSI via reflection.

4. Network-Level Protections: Implement robust network defenses, including Web Application Firewalls (WAFs) configured to detect and block exploitation attempts targeting React Server Components.

5. Incident Response Preparedness: Develop and regularly update incident response plans to swiftly address potential breaches resulting from this vulnerability.

Conclusion:

The React2Shell vulnerability represents a significant and ongoing threat to organizations worldwide. The sheer volume of attacks, coupled with the emergence of sophisticated malware campaigns, underscores the necessity for immediate and comprehensive mitigation strategies. By staying vigilant and proactive, organizations can protect their systems and data from this pervasive threat.