Untangling a Linux Incident With an OpenAI Twist (Part 2)
A Linux endpoint was simultaneously compromised by at least two distinct threat actors while the developer user relied on OpenAI's Codex AI agent for security remediation. Actor A deployed a cryptominer mining Monero to a private pool. Actor B installed a multi-revenue botnet including XMRig mining, residential proxy services, and bandwidth-selling components with eight different persistence mechanisms. Actor C, potentially affiliated with Actor B, executed mass data exfiltration of 15 categories including SSH keys, cloud credentials, and API tokens. The threat actors exploited CVE-2025-55182 (React2Shell) affecting Next.js and React applications. While Codex identified some threats, it lacked contextual awareness and privileged access needed for comprehensive incident response, creating additional noise that complicated SOC investigation. The endpoint was ultimately secured through managed EDR telemetry and expert SOC analysis.
AI Analysis
Technical Summary
The threat centers on a critical vulnerability in React Server Components identified as CVE-2025-55182, which is actively exploited by attackers to compromise Linux systems. Exploitation enables remote code execution without authentication or user interaction, allowing attackers to deploy a suite of malicious tools. PeerBlight is a Linux backdoor that uses the BitTorrent Distributed Hash Table (DHT) network as a fallback command and control (C2) mechanism, enhancing its resilience and stealth. CowTunnel is a reverse proxy tunnel that establishes outbound connections to attacker-controlled FRP servers, facilitating covert communication and data exfiltration. ZinFoq, a Go-based post-exploitation implant, provides advanced capabilities such as interactive shell access, SOCKS5 proxying for network pivoting, and timestomping to evade forensic detection. The attackers also distribute a variant of the Kaiji botnet, increasing the threat's scale and potential for distributed denial-of-service (DDoS) attacks. The exploitation is automated and targets multiple industries, leveraging the vulnerability's ease of exploitation and the widespread use of React Server Components in Linux environments. Indicators include malicious file hashes and suspicious domains like rtb.mftadsrvr.com. The attack chain involves initial exploitation, deployment of backdoors and implants, lateral movement, and persistent access, posing a severe risk to confidentiality, integrity, and availability of affected systems.
Potential Impact
This threat can lead to full system compromise of Linux servers running vulnerable React Server Components, resulting in unauthorized access, data theft, and disruption of services. The deployment of cryptominers can degrade system performance and increase operational costs. The PeerBlight backdoor's use of BitTorrent DHT for C2 makes detection and takedown challenging, increasing persistence and stealth. CowTunnel's reverse proxy capabilities enable attackers to bypass network restrictions and maintain covert communications. ZinFoq's advanced post-exploitation features facilitate lateral movement, network pivoting, and anti-forensic activities, complicating incident response. The distribution of a Kaiji botnet variant raises the risk of large-scale DDoS attacks originating from compromised hosts. Organizations worldwide face risks of data breaches, operational disruption, and reputational damage. Sectors with internet-facing Linux infrastructure, including cloud providers, financial services, healthcare, and government, are particularly vulnerable. The ease of exploitation and lack of required authentication amplify the threat's severity, demanding urgent remediation to prevent widespread compromise.
Mitigation Recommendations
1. Immediately apply all available patches or updates for React Server Components to remediate CVE-2025-55182. 2. If patches are unavailable, implement network-level controls to restrict inbound traffic to vulnerable services, using firewalls and access control lists. 3. Monitor network traffic for unusual outbound connections, especially to known malicious domains and IPs associated with BitTorrent DHT and FRP servers. 4. Deploy endpoint detection and response (EDR) solutions capable of identifying PeerBlight, CowTunnel, ZinFoq, and Kaiji botnet indicators, including file hashes and behavioral patterns. 5. Conduct regular integrity checks and forensic analysis to detect timestomping and other anti-forensic techniques. 6. Segment networks to limit lateral movement opportunities and isolate critical assets. 7. Harden Linux systems by disabling unnecessary services, enforcing least privilege principles, and applying security best practices for server hardening. 8. Educate security teams on the specific tactics, techniques, and procedures (TTPs) used by this threat to improve detection and response capabilities. 9. Maintain reliable backups and test restoration procedures to recover quickly from potential ransomware or destructive attacks following exploitation. 10. Implement strong authentication and multi-factor authentication (MFA) for administrative access to reduce the risk of privilege escalation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy
Indicators of Compromise
- cve: CVE-2025-30406
- hash: 30981d4082b58704d12a376c3cbb12fecb8a36c2bce64666315e26aef21e75c2
- hash: 48b006cb17e75ecdb707dc40dd654f449b94abe49f97a808b35cabca1c5fabbf
- domain: rtb.mftadsrvr.com
Untangling a Linux Incident With an OpenAI Twist (Part 2)
Description
A Linux endpoint was simultaneously compromised by at least two distinct threat actors while the developer user relied on OpenAI's Codex AI agent for security remediation. Actor A deployed a cryptominer mining Monero to a private pool. Actor B installed a multi-revenue botnet including XMRig mining, residential proxy services, and bandwidth-selling components with eight different persistence mechanisms. Actor C, potentially affiliated with Actor B, executed mass data exfiltration of 15 categories including SSH keys, cloud credentials, and API tokens. The threat actors exploited CVE-2025-55182 (React2Shell) affecting Next.js and React applications. While Codex identified some threats, it lacked contextual awareness and privileged access needed for comprehensive incident response, creating additional noise that complicated SOC investigation. The endpoint was ultimately secured through managed EDR telemetry and expert SOC analysis.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The threat centers on a critical vulnerability in React Server Components identified as CVE-2025-55182, which is actively exploited by attackers to compromise Linux systems. Exploitation enables remote code execution without authentication or user interaction, allowing attackers to deploy a suite of malicious tools. PeerBlight is a Linux backdoor that uses the BitTorrent Distributed Hash Table (DHT) network as a fallback command and control (C2) mechanism, enhancing its resilience and stealth. CowTunnel is a reverse proxy tunnel that establishes outbound connections to attacker-controlled FRP servers, facilitating covert communication and data exfiltration. ZinFoq, a Go-based post-exploitation implant, provides advanced capabilities such as interactive shell access, SOCKS5 proxying for network pivoting, and timestomping to evade forensic detection. The attackers also distribute a variant of the Kaiji botnet, increasing the threat's scale and potential for distributed denial-of-service (DDoS) attacks. The exploitation is automated and targets multiple industries, leveraging the vulnerability's ease of exploitation and the widespread use of React Server Components in Linux environments. Indicators include malicious file hashes and suspicious domains like rtb.mftadsrvr.com. The attack chain involves initial exploitation, deployment of backdoors and implants, lateral movement, and persistent access, posing a severe risk to confidentiality, integrity, and availability of affected systems.
Potential Impact
This threat can lead to full system compromise of Linux servers running vulnerable React Server Components, resulting in unauthorized access, data theft, and disruption of services. The deployment of cryptominers can degrade system performance and increase operational costs. The PeerBlight backdoor's use of BitTorrent DHT for C2 makes detection and takedown challenging, increasing persistence and stealth. CowTunnel's reverse proxy capabilities enable attackers to bypass network restrictions and maintain covert communications. ZinFoq's advanced post-exploitation features facilitate lateral movement, network pivoting, and anti-forensic activities, complicating incident response. The distribution of a Kaiji botnet variant raises the risk of large-scale DDoS attacks originating from compromised hosts. Organizations worldwide face risks of data breaches, operational disruption, and reputational damage. Sectors with internet-facing Linux infrastructure, including cloud providers, financial services, healthcare, and government, are particularly vulnerable. The ease of exploitation and lack of required authentication amplify the threat's severity, demanding urgent remediation to prevent widespread compromise.
Mitigation Recommendations
1. Immediately apply all available patches or updates for React Server Components to remediate CVE-2025-55182. 2. If patches are unavailable, implement network-level controls to restrict inbound traffic to vulnerable services, using firewalls and access control lists. 3. Monitor network traffic for unusual outbound connections, especially to known malicious domains and IPs associated with BitTorrent DHT and FRP servers. 4. Deploy endpoint detection and response (EDR) solutions capable of identifying PeerBlight, CowTunnel, ZinFoq, and Kaiji botnet indicators, including file hashes and behavioral patterns. 5. Conduct regular integrity checks and forensic analysis to detect timestomping and other anti-forensic techniques. 6. Segment networks to limit lateral movement opportunities and isolate critical assets. 7. Harden Linux systems by disabling unnecessary services, enforcing least privilege principles, and applying security best practices for server hardening. 8. Educate security teams on the specific tactics, techniques, and procedures (TTPs) used by this threat to improve detection and response capabilities. 9. Maintain reliable backups and test restoration procedures to recover quickly from potential ransomware or destructive attacks following exploitation. 10. Implement strong authentication and multi-factor authentication (MFA) for administrative access to reduce the risk of privilege escalation.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.huntress.com/blog/cve-2025-30406-critical-gladinet-centrestack-triofox-vulnerability-exploited-in-the-wild"]
- Adversary
Indicators of Compromise
Cve
| Value | Description | Copy |
|---|---|---|
cveCVE-2025-30406 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash30981d4082b58704d12a376c3cbb12fecb8a36c2bce64666315e26aef21e75c2 | — | |
hash48b006cb17e75ecdb707dc40dd654f449b94abe49f97a808b35cabca1c5fabbf | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainrtb.mftadsrvr.com | — |
Threat ID: 682c992c7960f6956616aa45
Added to database: 5/20/2025, 3:01:00 PM
Last enriched: 2/25/2026, 10:31:00 PM
Last updated: 5/8/2026, 11:34:54 AM
Views: 222
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.