Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

PeerBlight Linux Backdoor Exploits React2Shell CVE-2025-55182

0
Medium
Published: Wed Dec 10 2025 (12/10/2025, 14:34:45 UTC)
Source: AlienVault OTX

Description

The PeerBlight Linux backdoor exploits the critical React Server Components vulnerability CVE-2025-55182, enabling attackers to deploy multiple malicious tools including cryptominers, a Linux backdoor (PeerBlight), a reverse proxy tunnel (CowTunnel), and a Go-based post-exploitation implant (ZinFoq). PeerBlight leverages the BitTorrent DHT network as a fallback command and control channel, while CowTunnel connects to attacker-controlled FRP servers. ZinFoq provides interactive shells, SOCKS5 proxying, and timestomping capabilities. Additionally, a Kaiji botnet variant is distributed through these attacks. Exploitation is automated and targets multiple industries worldwide. The vulnerability allows unauthenticated remote code execution without user interaction, facilitating full system compromise and privilege escalation. Immediate patching and mitigation are critical due to the ease of exploitation and the broad impact on Linux systems running vulnerable React Server Components. Organizations in Europe, especially Germany, UK, France, Netherlands, Sweden, and Italy, are at significant risk due to market penetration and historical attack patterns.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/25/2026, 22:31:00 UTC

Technical Analysis

The threat centers on a critical vulnerability in React Server Components identified as CVE-2025-55182, which is actively exploited by attackers to compromise Linux systems. Exploitation enables remote code execution without authentication or user interaction, allowing attackers to deploy a suite of malicious tools. PeerBlight is a Linux backdoor that uses the BitTorrent Distributed Hash Table (DHT) network as a fallback command and control (C2) mechanism, enhancing its resilience and stealth. CowTunnel is a reverse proxy tunnel that establishes outbound connections to attacker-controlled FRP servers, facilitating covert communication and data exfiltration. ZinFoq, a Go-based post-exploitation implant, provides advanced capabilities such as interactive shell access, SOCKS5 proxying for network pivoting, and timestomping to evade forensic detection. The attackers also distribute a variant of the Kaiji botnet, increasing the threat's scale and potential for distributed denial-of-service (DDoS) attacks. The exploitation is automated and targets multiple industries, leveraging the vulnerability's ease of exploitation and the widespread use of React Server Components in Linux environments. Indicators include malicious file hashes and suspicious domains like rtb.mftadsrvr.com. The attack chain involves initial exploitation, deployment of backdoors and implants, lateral movement, and persistent access, posing a severe risk to confidentiality, integrity, and availability of affected systems.

Potential Impact

This threat can lead to full system compromise of Linux servers running vulnerable React Server Components, resulting in unauthorized access, data theft, and disruption of services. The deployment of cryptominers can degrade system performance and increase operational costs. The PeerBlight backdoor's use of BitTorrent DHT for C2 makes detection and takedown challenging, increasing persistence and stealth. CowTunnel's reverse proxy capabilities enable attackers to bypass network restrictions and maintain covert communications. ZinFoq's advanced post-exploitation features facilitate lateral movement, network pivoting, and anti-forensic activities, complicating incident response. The distribution of a Kaiji botnet variant raises the risk of large-scale DDoS attacks originating from compromised hosts. Organizations worldwide face risks of data breaches, operational disruption, and reputational damage. Sectors with internet-facing Linux infrastructure, including cloud providers, financial services, healthcare, and government, are particularly vulnerable. The ease of exploitation and lack of required authentication amplify the threat's severity, demanding urgent remediation to prevent widespread compromise.

Mitigation Recommendations

1. Immediately apply all available patches or updates for React Server Components to remediate CVE-2025-55182. 2. If patches are unavailable, implement network-level controls to restrict inbound traffic to vulnerable services, using firewalls and access control lists. 3. Monitor network traffic for unusual outbound connections, especially to known malicious domains and IPs associated with BitTorrent DHT and FRP servers. 4. Deploy endpoint detection and response (EDR) solutions capable of identifying PeerBlight, CowTunnel, ZinFoq, and Kaiji botnet indicators, including file hashes and behavioral patterns. 5. Conduct regular integrity checks and forensic analysis to detect timestomping and other anti-forensic techniques. 6. Segment networks to limit lateral movement opportunities and isolate critical assets. 7. Harden Linux systems by disabling unnecessary services, enforcing least privilege principles, and applying security best practices for server hardening. 8. Educate security teams on the specific tactics, techniques, and procedures (TTPs) used by this threat to improve detection and response capabilities. 9. Maintain reliable backups and test restoration procedures to recover quickly from potential ransomware or destructive attacks following exploitation. 10. Implement strong authentication and multi-factor authentication (MFA) for administrative access to reduce the risk of privilege escalation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.huntress.com/blog/cve-2025-30406-critical-gladinet-centrestack-triofox-vulnerability-exploited-in-the-wild"]
Adversary

Indicators of Compromise

Cve

ValueDescriptionCopy
cveCVE-2025-30406

Hash

ValueDescriptionCopy
hash30981d4082b58704d12a376c3cbb12fecb8a36c2bce64666315e26aef21e75c2
hash48b006cb17e75ecdb707dc40dd654f449b94abe49f97a808b35cabca1c5fabbf

Domain

ValueDescriptionCopy
domainrtb.mftadsrvr.com

Threat ID: 682c992c7960f6956616aa45

Added to database: 5/20/2025, 3:01:00 PM

Last enriched: 2/25/2026, 10:31:00 PM

Last updated: 3/24/2026, 12:08:16 AM

Views: 155

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses