Security News Attackers Use New Tool to Scan for React2Shell Exposure

Divergent

Level 26
Thread author
Verified
Jul 26, 2025
1,478
4,818
2,468
New data suggests a cyber espionage group is laying the groundwork for attacks against major industries.

The "React2Shell" vulnerability is already almost a few months old, but it's far from over. An unknown but possibly state-sponsored threat actor has been using a newly discovered, maturely named toolkit — "ILovePoop" — to probe tens of millions of Internet protocol (IP) addresses worldwide, looking for opportunities to exploit React2Shell. A report from WhoisXML API, shared with Dark Reading, suggests the threat actor might be out for big game: government, defense, finance, and industrial organizations, among others, around the world but particularly in the United States.

 
Technical Analysis & Remediation

MITRE ATT&CK Mapping

T1190

Exploit Public-Facing Application
(React2Shell vulnerability exploitation).

T1568
Dynamic Resolution
(PeerBlight utilizing BitTorrent DHT for resilient C2 communications).

T1486
Data Encrypted for Impact
(Integration into ransomware campaigns).

CVE Profile
10.0 Critical
[CISA KEV Status: Active].

Telemetry

Hashes

Unknown (Not provided in source telemetry).

IPs
Unknown (Over 37,000 networks probed, but specific origin IPs are omitted).

Strings
"ILovePoop"
"CVE-2025-55182"
"PeerBlight"
"React Server Components"

Constraint
While specific payloads were not hashed in the source telemetry, the network behavior suggests automated botnet integration and a decentralized C2 fallback mechanism.

Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)

GOVERN (GV) – Crisis Management & Oversight

Command

Initiate emergency patch management protocols for all internet-facing assets running React Server Components.

DETECT (DE) – Monitoring & Analysis

Command
Query WAF logs and SIEM for unauthenticated, anomalous web requests targeting React infrastructure.

Command
Monitor outbound network traffic for unexpected BitTorrent DHT protocol signatures associated with the PeerBlight C2 fallback.

RESPOND (RS) – Mitigation & Containment

Command
Isolate vulnerable React servers from internal production networks until patched.

RECOVER (RC) – Restoration & Trust

Command
Rebuild compromised web servers from known-clean golden images, verifying the code integrity of the React framework prior to redeployment.

IDENTIFY & PROTECT (ID/PR) – The Feedback Loop

Command
Implement Web Application Firewalls (WAF) with specific rulesets designed to filter known React2Shell exploit patterns.

Remediation - THE HOME USER TRACK (Safety Focus)

Priority 1: Safety

Command
Normal home users are generally unaffected as this attack exploits enterprise-level React web servers; disconnecting from the internet is unnecessary unless you are actively hosting a React Server Components application from your home network.

Command
Do not log into banking/email until verified clean. (Standard hygiene, though the direct threat to consumer PCs is low).

Priority 2: Identity

Command
Reset passwords/MFA using a known clean device (e.g., phone on 5G) if you operate a vulnerable React-based server or website that was compromised.

Priority 3: Persistence

Command
Check Scheduled Tasks, Startup Folders, and Browser Extensions. (For developers hosting local environments).

Hardening & References

Baseline

CIS Benchmarks for Web Server Security.

Framework
NIST CSF 2.0 / SP 800-61r3.

Source

Dark Reading
 
  • Like
Reactions: harlan4096
Interesting to see how React2Shell is already on the radar of advanced actors. The urgency of patching and monitoring is clear: better safe than sorry. 🔒⚠️🛡️
 
  • Like
Reactions: Brownie2019