InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: North Korea-linked attackers exploit React2Shell to deploy new EtherRAT malware
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > North Korea-linked attackers exploit React2Shell to deploy new EtherRAT malware
Technology

North Korea-linked attackers exploit React2Shell to deploy new EtherRAT malware

December 9, 2025 7 Min Read
Share
North Korea-linked attackers exploit React2Shell to deploy new EtherRAT malware
SHARE

North Korean-linked attackers may have become the latest attackers to exploit a recently disclosed critical security flaw in React2Shell in React Server Components (RSC) to deliver a previously undocumented remote access Trojan. EtherRAT.

“EtherRAT leverages Ethereum smart contracts for command-and-control (C2) resolution, deploys five independent Linux persistence mechanisms, and downloads its own Node.js runtime from nodejs.org,” Sysdig said in a report published Monday.

The cloud security company said this activity shows significant overlap with a long-running campaign codenamed “Contagious Interview,” which has been observed leveraging EtherHiding technology to distribute malware since February 2025.

Contagious Interview is the name given to a series of attacks that target blockchain and Web3 developers and others through fake job interviews, coding challenges, and video assessments, leading to the deployment of malware. These efforts typically begin with a ruse to lure victims through platforms like LinkedIn, Upwork, and Fiverr, where the threat actor poses as a recruiter offering lucrative job opportunities.

According to software supply chain security firm Socket, this is one of the most prolific campaigns exploiting the npm ecosystem, highlighting its ability to adapt to JavaScript and cryptocurrency-centric workflows.

The attack chain begins by exploiting RSC’s highest severity security vulnerability, CVE-2025-55182 (CVSS score: 10.0), by executing a Base64-encoded shell command that downloads and executes a shell script responsible for deploying the main JavaScript implant.

Shell scripts are obtained using the curl command, using wget and python3 as fallbacks. It is also designed to prepare the environment by downloading Node.js v20.10.0 from nodejs.org, and then writes an encrypted blob and an obfuscated JavaScript dropper to disk. Once all of these steps are complete, proceed to remove the shell script, minimize the forensic trail, and run the dropper.

See also  Samsung fixes critical zero-day CVE-2025-21043 utilized in Android attacks

The main purpose of the dropper is to decrypt the EtherRAT payload using a hardcoded key and generate it using the downloaded Node.js binary. The malware is notable for using EtherHiding to retrieve the C2 server URL from an Ethereum smart contract every five minutes, allowing operators to easily update the URL even if it is deleted.

“What makes this implementation unique is the use of consensus voting across nine public Ethereum remote procedure call (RPC) endpoints,” Sysdig said. “EtherRAT queries all nine endpoints in parallel, collects the responses, and selects the URLs returned from a large number of endpoints.”

“This consensus mechanism protects against several attack scenarios: a single compromised RPC endpoint cannot redirect bots to a sinkhole, and researchers cannot manipulate rogue RPC nodes to disrupt C2 resolution.”

It is worth noting that similar implementations were previously observed in two npm packages named colortoolsv2 and mimelib2 that were found to distribute downloader malware to developer systems.

Once EtherRAT establishes a connection with a C2 server, it enters a polling loop that runs every 500 milliseconds and interprets responses longer than 10 characters as JavaScript code that is executed on the infected machine. Persistence is achieved using five different methods.

  • Systemd User Services
  • XDG autostart entry
  • Cron job
  • .bashrc injection
  • profile injection

Using multiple mechanisms, threat actors can ensure malware runs even after a system reboot, allowing continued access to infected systems. Another sign of the malware’s sophistication is its ability to self-update by submitting its own source code to an API endpoint and then overwriting itself with new code received from the C2 server.

See also  Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

It then launches a new process with the updated payload. It’s worth noting here that the C2 returns a functionally identical but different obfuscated version, potentially allowing it to bypass static signature-based detection.

In addition to the use of EtherHiding, the link to Contagious Interview stems from the overlap between the encrypted loader pattern used by EtherRAT and a known JavaScript information stealer and downloader named BeaverTail.

“EtherRAT represents a major evolution in React2Shell exploitation, moving beyond opportunistic cryptomining and credential theft to persistent, stealth access designed for long-term operation,” Sysdig said.

“Whether this represents North Korean attackers pivoting to new exploitation vectors, or advanced technology borrowed by another threat actor, the result is the same: Defenders are faced with a difficult new implant that resists traditional detection and removal methods.”

Contagious Interview moved from npm to VS Code

This disclosure comes as OpenSourceMalware details a new Contagious Interview variant that prompts victims to clone a malicious repository on GitHub, GitLab, or Bitbucket and launch a project in Microsoft Visual Studio Code (VS Code) as part of a programming challenge.

This runs VS Code’s task.json file, which is configured with runOptions.runOn: ‘folderOpen’, and autoruns as soon as the project is opened. This file is designed to download the loader script using curl or wget based on the operating system of the compromised host.

For Linux, the next step is a shell script that downloads and runs another shell script named “vscode-bootstrap.sh”. Next, fetch two more files: “package.json” and “env-setup.js”. The latter acts as a launch pad for BeaverTail and InvisibleFerret.

OpenSourceMalware said it has identified 13 different versions of this campaign spread to 27 different GitHub users, as well as 11 different versions of BeaverTail. The oldest repository (‘github(.)com/MentarisHub121/TokenPresaleApp’) dates back to April 22, 2025, and the latest version (‘github(.)com/eferos93/test4’) was created on December 1, 2025.

See also  Google sues China-based hackers behind $1 billion Lighthouse phishing platform

The OpenSourceMalware team stated that “North Korean threat actors have flocked to Vercel and are now using it almost exclusively.” “For unknown reasons, Contagious Interview has stopped using Fly.io, Platform.sh, Render, and other hosting providers.”

Share This Article
Twitter Copy Link
Previous Article Final Fantasy 16 is a truly iconic RPG that has fallen to all-time lows in a short amount of time Final Fantasy 16 is a truly iconic RPG that has fallen to all-time lows in a short amount of time
Next Article Tony Dokoupil becomes the next anchor of "CBS Evening News" Tony Dokoupil becomes the next anchor of “CBS Evening News”

Latest News

Spyware alerts, Mirai Strikes, Docker leaks, ValleyRAT rootkits — 20 more stories

Spyware alerts, Mirai Strikes, Docker leaks, ValleyRAT rootkits — 20 more stories

This week's cyber articles show how quickly the online world…

December 11, 2025
React2Shell exploit delivers crypto miners and new malware across multiple sectors

React2Shell exploit delivers crypto miners and new malware across multiple sectors

React2 shell Threat actors continue to witness large-scale exploitation of…

December 10, 2025
North Korea-linked attackers exploit React2Shell to deploy new EtherRAT malware

North Korea-linked attackers exploit React2Shell to deploy new EtherRAT malware

North Korean-linked attackers may have become the latest attackers to…

December 9, 2025
Experts confirm that JS#SMUGGLER uses compromised sites to deploy NetSupport RAT

Experts confirm that JS#SMUGGLER uses compromised sites to deploy NetSupport RAT

Cybersecurity researchers say, “ JS#Smuggler It has been observed using…

December 8, 2025
React2Shell critical flaw added to CISA KEV after active exploitation

React2Shell critical flaw added to CISA KEV after active exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday…

December 7, 2025

You Might Also Like

Grafana patch CVSS 10.0 SCIM flaw allows impersonation and privilege escalation
Technology

Grafana patch CVSS 10.0 SCIM flaw allows impersonation and privilege escalation

2 Min Read
Critical WSUS Vulnerability
Technology

Critical, newly patched Microsoft WSUS flaw exploited

6 Min Read
LastPass warns about fake repositories that infect MacOS with Atomic Infostealer
Technology

LastPass warns about fake repositories that infect MacOS with Atomic Infostealer

2 Min Read
New Coldriver Malware Campaign joins BO Team and Bearlyfy in a Russian-focused cyberattack
Technology

New Coldriver Malware Campaign joins BO Team and Bearlyfy in a Russian-focused cyberattack

6 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?