React2Shell Exploits Fuel Surge in Linux Backdoors
A critical React2Shell vulnerability (CVE-2025-55182, CVSS 10.0) is being actively weaponized to deploy advanced Linux backdoors, notably KSwapDoor and ZnDoor, according to Palo Alto Networks Unit 42, NTT Security, Google, and Microsoft.
Inside KSwapDoor
- Professionally engineered RAT focused on stealth
- Builds a peer-to-peer mesh to route traffic across compromised servers and evade blocks
- Uses strong encryption and a sleeper mode that can be remotely awakened to bypass firewalls
- Likely linked to China-nexus actors based on code overlap with prior Linux backdoors
- Limited, targeted deployment consistent with bespoke tooling
- Capabilities: interactive shell, command execution, file and process operations, lateral-movement scanning
- Evasion: masquerades as the Linux kernel swap daemon
- Initially misclassified as BPFDoor due to raw socket sniffing; in KSwapDoor this is a dormant backup, while its main engine is a P2P router (a capability BPFDoor lacks)
ZnDoor hits organizations in Japan
- Delivered through React2Shell exploitation, with payloads fetched via bash and wget from 45.76.155[.]14
- Operates as a remote access trojan that receives and executes attacker commands
- Supported commands include:
- shell and interactive_shell
- explorer (list directories), explorer_cat (read file), explorer_delete (delete), explorer_upload/download (file transfer)
- system (gather system info)
- change_timefile (alter file timestamps)
- socket_quick_startstreams (start SOCKS5 proxy)
- start_in_port_forward / stop_in_port (port forwarding control)
Broader exploitation at scale
- Google observed multiple China-nexus groups abusing CVE-2025-55182 to deploy varied payloads:
- UNC6600: MINOCAT tunneler
- UNC6586: SNOWLIGHT downloader
- UNC6588: COMPOOD backdoor
- UNC6603: HISONIC (Go backdoor) using Cloudflare Pages and GitLab for config retrieval
- UNC6595: Linux ANGRYREBEL (aka Noodle RAT)
- Microsoft reports post-exploitation includes reverse shells to known Cobalt Strike servers, installation of RMM tools like MeshAgent, modifying authorized_keys, and enabling root login
- Payloads seen: VShell, EtherRAT, SNOWLIGHT, ShadowPad, XMRig
- Operators are leveraging Cloudflare Tunnel endpoints (*.trycloudflare.com) to blend in, while mapping environments for lateral movement and credential theft
Cloud and secrets theft
- Credential harvesting focused on Azure, AWS, GCP, and Tencent Cloud by abusing cloud Instance Metadata Service (IMDS) endpoints to obtain identity tokens
- Attackers used TruffleHog, Gitleaks, and custom scripts to extract secrets
- Attempts included harvesting OpenAI API keys, Databricks tokens, and Kubernetes service-account credentials, plus use of Azure CLI (az) and Azure Developer CLI (azd) to obtain tokens
Operation PCPcat: Next.js exploitation
- Separate campaign exploits Next.js flaws (CVE-2025-29927 and CVE-2025-66478, the latter a React2Shell duplicate) to systematically exfiltrate:
- .env files (.env, .env.local, .env.production, .env.development)
- System environment variables
- SSH keys (~/.ssh/id_rsa, ~/.ssh/id_ed25519, /root/.ssh/*)
- Cloud credentials (~/.aws/credentials, ~/.docker/config.json)
- Git credentials (~/.git-credentials, ~/.gitconfig)
- Command history (~/.bash_history)
- Sensitive system files (/etc/shadow, /etc/passwd)
- Persistence established, SOCKS5 proxy installed, reverse shell to 67.217.57[.]240:888, and a React scanner deployed for further propagation
- Estimated 59,128 servers already breached; activity suggests industrial-scale data exfiltration
Exposure snapshot
- Shadowserver tracks over 111,000 IPs vulnerable to React2Shell, with the U.S. leading (~77,800), followed by Germany (~7,500), France (~4,000), and India (~2,300)
- GreyNoise observed 547 malicious IPs across the U.S., India, the U.K., Singapore, and the Netherlands in the past 24 hours
Defender considerations
- Patch and mitigate CVE-2025-55182 urgently; review Next.js deployments for related issues
- Monitor for unusual egress, Cloudflare Tunnel usage, and peer-to-peer traffic patterns
- Audit IMDS access, rotate credentials, and scan for leaked secrets in code and CI/CD
- Hunt for masquerading processes (e.g., fake swap daemons) and anomalous SSH key changes
Note: The report was updated to include additional technical details on KSwapDoor.
Source: The Hacker News
Backā¦