February 20, 2026 Source: Dark Reading 3 min read · 625 words

Attackers Use New Tool to Scan for React2Shell Exposure

Зловмисники використовують новий інструмент для сканування вразливостей React2Shell

Threat actors are hunting your React2Shell instances right now. Security researchers just caught them doing it—and they're using a purpose-built toolkit to scan networks for this specific vulnerability.

This isn't theoretical. According to Dark Reading, we're looking at an actual malware campaign with real exploitation attempts happening in the wild against high-value targets. That changes things.

The Breach

Here's what went down: researchers discovered that attackers have developed and deployed a new scanning toolkit specifically designed to identify and exploit React2Shell vulnerabilities. The toolkit automates the hunt for exposed instances, which means speed. Which means scale. Which means your organization could be on their list right now.

The targeting isn't random.

These aren't opportunistic criminals scanning the entire internet for whatever sticks. The attackers are going after high-value networks—the kind of targets that justify focused, weaponized tools. That's the dangerous part. When someone builds custom exploitation code, they're not messing around.

So why does this matter for your organization? Because a port scan cyber attack against your infrastructure looking for these vulnerabilities is probably already happening, or will be soon.

Under the Hood

The toolkit works by hunting for React2Shell exposure across networks. It's essentially an automated vulnerability scanner purpose-built for this specific flaw. Think of it like a guided missile versus a shotgun blast—way more effective.

Security researchers are analyzing the code's behavior right now. The toolkit performs what amounts to a sophisticated scan vulnerability operation, probing systems methodically to identify which ones are vulnerable. Can cyber attacks be traced back to their origin? Sometimes. But these scans are being conducted by organized threat actors who know how to cover their tracks.

If you've got security tools in place—open source scanners like the kind available on scan vulnerability github repositories, or Kali-based utilities for scan vulnerability testing—you might detect outbound probing attempts. But here's the thing: attackers know you're watching. They'll use compromised infrastructure and rotate tactics.

And then there's the exposure itself.

React2Shell isn't some obscure edge case. It's a real vulnerability affecting real systems. Exposure and vulnerability examples from previous campaigns show us that when tools get this specific, exploitation success rates climb fast.

The Fallout

Organizations running vulnerable React2Shell instances without proper segmentation are at genuine risk. We're talking potential remote code execution, lateral movement into critical systems, the whole nightmare scenario.

The cascade effect is real. Once attackers gain initial access through a vulnerable endpoint, they've got a foothold. From there, they scan for additional vulnerabilities, escalate privileges, and move deeper into your network. That initial compromise snowballs.

How can you detect a cyber attack like this in progress? There are 5 ways to detect a cyber attack that matter here: unusual network traffic patterns from your web servers, spike in authentication failures, unexpected process execution tied to web services, outbound connections to known malicious IPs, and abnormal CPU or memory usage on affected systems.

Protecting Yourself

First, inventory your React2Shell instances immediately. Not next quarter. Now. Understand what's exposed and from where.

Second, if you're running vulnerable versions, patch them. This isn't optional. Dark Reading's reporting makes clear that active exploitation is happening, not coming, but happening.

Third, scan vulnerability online using legitimate tools, but do it from your own network to understand your actual exposure. Use scan vulnerability Kali tools if you've got the expertise, or deploy open source vulnerability scanners to get a baseline of what an attacker would find.

Fourth, segment your network so that even if React2Shell gets compromised, attackers can't just waltz into your crown jewels. Make them work for it.

And finally, monitor actively. Threat hunting isn't just for enterprises with massive budgets anymore. You need to be looking for these scans, these probes, these initial access attempts before they become breaches.

The toolkit exists. The campaign is active. The only question left is whether you'll act before your organization becomes part of the casualty list.

Read original article →

Concerned about your project's security? Run an automated pentest with AISEC — AI-powered scanner with expert verification. Go to dashboard →