What's Happening?
Chinese state-sponsored hackers have been actively exploiting a newly disclosed vulnerability known as React2Shell (CVE-2025-55182), which affects React Server Components. This vulnerability allows unauthenticated
remote code execution, posing a significant threat to various sectors. According to Amazon Web Services (AWS), two China-linked threat actors, Earth Lamia and Jackpot Panda, have been observed attempting to exploit this flaw shortly after its public disclosure. These groups have targeted sectors including financial services, logistics, retail, IT companies, universities, and government organizations across Latin America, the Middle East, and Southeast Asia. The attacks involve embedding backdoors in VMware vSphere environments to maintain persistent access, with a focus on sectors across these regions.
Why It's Important?
The exploitation of the React2Shell vulnerability by Chinese state-sponsored hackers highlights the ongoing threat of cyber espionage and infrastructure attacks. This development underscores the need for heightened cybersecurity measures across critical infrastructure and government networks. The ability of these hackers to rapidly exploit newly disclosed vulnerabilities demonstrates their advanced capabilities and poses a significant risk to global security. The sectors targeted by these attacks are crucial to the functioning of economies and societies, and any disruption could have far-reaching consequences. The involvement of state-sponsored actors suggests a strategic intent to gain long-term access and potentially disrupt or sabotage critical systems.
What's Next?
Organizations using React and Next.js are urged to apply security updates immediately to mitigate the risk of exploitation. Cybersecurity authorities, including the US Cybersecurity and Infrastructure Security Agency (CISA), are likely to issue further warnings and guidance to protect against these threats. The ongoing monitoring and analysis of these attacks will be crucial in understanding the full scope of the threat and developing effective countermeasures. As the situation evolves, there may be increased collaboration between international cybersecurity agencies to address the threat posed by state-sponsored cyber actors.











