Skip to main content

中國駭客Shadow-Earth-053傳利用React2Shell滲透Linux主機

Posted in 業界新聞
新聞

趨勢科技在追蹤Shadow-Earth-053的活動發現,去年12月中旬,有人從194[.]38[.]11[.]3接收Linux版的ShadowPad,方法是監聽1790埠,該公司取得ELF樣本檔案分析,確認是被稱做Noodle RAT的變種後門程式。而駭客滲透Linux主機的方法,就是利用React伺服器元件(RSC)重大資安漏洞React2Shell(CVE-2025-55182)。

根據駭客使用的C2網域名稱domain check[.]office365-update[.]com,其名稱的結構特徵與Shadow-Earth-053所有的網域相似,因此趨勢科技推測,背後的攻擊者應該就是Shadow-Earth-053。

Preview image for Inside Shadow-Earth-053: A China-Aligned Cyberespionage Campaign Against Government and Defense Sectors in Asia

Inside Shadow-Earth-053: A China-Aligned Cyberespionage Campaign Against Government and Defense Sectors in Asia

A China-aligned threat group is exploiting unpatched Microsoft Exchange vulnerabilities to conduct cyberespionage against government and critical infrastructure targets across Asia and beyond.

www.trendmicro.com
View original 0 Likes 0 Boosts

Comments (0)

No comments yet.