Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Cryptominers, Reverse Shells Dropped in Recent React2Shell Attacks
    Cybersecurity

    Cryptominers, Reverse Shells Dropped in Recent React2Shell Attacks

    adminBy adminFebruary 4, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Vulnerability
    Share
    Facebook Twitter LinkedIn Pinterest Email

    React2Shell exploitation activity remains strong, with over 1.4 million attempts observed over the past week, GreyNoise reports.

    A critical-severity vulnerability in version 19 of the open source JavaScript library React (React.js), React2Shell is tracked as CVE-2025-55182 (CVSS score of 10).

    The issue can be exploited without authentication to achieve remote code execution (RCE) via a single HTTP POST request and the activity surrounding it surged after a Metasploit module was published.

    The bug is related to the decoding of payloads sent to React Server Function endpoints. Even applications without React Server Function endpoints may be vulnerable if they support React Server Components (RSC).

    Exploitation of the flaw started roughly two days after public disclosure in early December, and both state-sponsored threat actors and cybercrime groups have been observed targeting it.

    According to GreyNoise, over 1,000 IP addresses have been involved in React2Shell exploitation over the past week, but two of them were responsible for most of the observed activity.

    Advertisement. Scroll to continue reading.

    The threat intelligence firm observed 488,342 attack sessions, representing 34% of the exploitation activity, originating from 193.142.147[.]209 and leading to the deployment of a reverse shell.

    These attacks, GreyNoise says, were likely aimed at setting up interactive access to the vulnerable instances rather than automated data theft.

    The second IP address that stood out, 87.121.84[.]24, was responsible for 311,484 attack sessions, representing 22% of the malicious activity.

    Upon successful exploitation of React2Shell, these attacks resulted in the deployment of an XMRig cryptocurrency miner from one of two staging servers.

    GreyNoise’s analysis revealed that one of these staging servers has been involved in malicious activities since at least 2020. Adjacent IP addresses are currently serving Mirai and Gafgyt payloads, the threat intelligence firm says.

    Related: Security Analysis of Moltbook Agent Network: Bot-to-Bot Prompt Injection and Data Leaks

    Related: Russia’s APT28 Rapidly Weaponizes Newly Patched Office Vulnerability

    Related: Phishers Abuse SharePoint in New Campaign Targeting Energy Sector

    Related: APT-Grade PDFSider Malware Used by Ransomware Groups

    attacks Cryptominers Dropped React2Shell Reverse Shells
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleSamsung teases big Galaxy S26 camera upgrades
    Next Article Please stop using OpenClaw, formerly known as Moltbot, formerly known as Clawdbot
    admin
    • Website

    Related Posts

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026

    Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google TV Home (Android TV) 1.0.900391771 APK Download by Google LLC

    April 19, 2026

    The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now

    April 19, 2026

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,400)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,676)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google TV Home (Android TV) 1.0.900391771 APK Download by Google LLC

    April 19, 2026

    The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now

    April 19, 2026

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026
    Most Popular
    • Google TV Home (Android TV) 1.0.900391771 APK Download by Google LLC
    • The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now
    • Apple AirTag tracking can be misled by replayed Bluetooth signals
    • NIST to stop rating non-priority flaws due to volume increase
    • Home Assistant’s intimidating reputation is completely undeserved once you survive the first week
    • The Complete Guide To Agentic Commerce
    • I’ve used Samsung Browser for years, but this is why I won’t go back to Chrome
    • This $10 accessory has completely transformed my Pixel 10
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.