North Korean hackers deploy new EtherRAT malware in React2Shell attacks

A new malware implant dubbed EtherRAT has been observed in active attacks exploiting the recently disclosed React2Shell vulnerability (CVE-2025-55182), according to researchers at cloud security firm Sysdig.

The React2Shell flaw, a critical deserialization bug in the React Server Components Flight protocol, allows unauthenticated remote code execution via crafted HTTP requests.

The implant, recovered from a compromised Next.js application just two days after the flaw became public, comes with sophisticated mix of features, including blockchain-based command-and-control, multi-layered persistence, and a full Node.js runtime for evasion.

Sysdig believes EtherRAT shares close technical and operational similarities with tools used in North Korea’s Contagious Interview campaigns, though they note that several elements differ from previously known malware.

Exploitation began mere hours after disclosure, with early activity linked to China-based groups Earth Lamia and Jackpot Panda, followed by automated scanning and attacks. At least 30 organizations across multiple sectors have been compromised, with intrusions aimed at credential theft, cryptomining, and deployment of commodity backdoors.

EtherRAT id deployed via a multi-stage chain that begins with a base64-encoded shell command executed via React2Shell. The command repeatedly attempts to download a malicious shell script, which then installs a hidden Node.js v20.10.0 runtime, decrypts an embedded payload, and launches the final implant.

Once active, EtherRAT uses Ethereum smart contracts for communication with its operators. This technique, referred to as ‘EtherHiding,’ was previously observed in North Korean campaigns. The malware queries multiple public Ethereum RPC providers simultaneously to avoid takedown or node poisoning, then receives JavaScript instructions to execute in what functions as a fully interactive remote shell.

Sysdig notes that EtherRAT’s encrypted loader is similar to the BeaverTail malware attributed to DPRK-linked actors. The implant also includes a self-update feature that allows it to fetch newly obfuscated code from an API endpoint, overwrite itself, and relaunch.

Given that widespread exploitation already underway, administrators are urged to upgrade to patched React and Next.js versions as soon as possible to mitigate ongoing attacks.


Back to the list

Latest Posts

Cyber Security Week in Review: January 16, 2026

In brief: Microsoft fixes a Windows zero-day flaw, Russian hackers target Ukraine posing as charities, and more.
16 January 2026

RedVDS cybercrime platform disrupted in global takedown

RedVDS sold access to disposable virtual Windows servers for as little as $24 a month, allowing criminals to run fraud and phishing operations at scale.
15 January 2026

Administrator of AVCheck malware testing service arrested in the Netherlands

The man is suspected of facilitating cybercrime by allowing malware devs to test whether their software could bypass antivirus protections.
15 January 2026