Red Alert! Chinese Hackers Exploiting React2Shell, BRICKSTORM Backdoor in US Infrastructure

14/12/2025 4 min
Red Alert! Chinese Hackers Exploiting React2Shell, BRICKSTORM Backdoor in US Infrastructure

Listen "Red Alert! Chinese Hackers Exploiting React2Shell, BRICKSTORM Backdoor in US Infrastructure"

Episode Synopsis

This is your Red Alert: China's Daily Cyber Moves podcast.I’m Ting, and listeners, we are on red alert.Over the past few days, U.S. agencies have been in near-constant firefighting mode against Chinese state-backed operators and their friends. According to CISA and FBI joint updates summarized by Western Illinois University’s Cybersecurity Center, investigators tied multiple Chinese-nexus groups to exploitation of the new React2Shell bug in React Server Components, tracked as CVE‑2025‑55182. CISA first added React2Shell to its Known Exploited Vulnerabilities catalog on December 6, then by December 12 was warning of “large‑scale global attacks” and ordering federal agencies to patch immediately or disconnect affected apps from the internet.Here’s how the week unfolded. Late last week, CISA and partner agencies published details on BRICKSTORM, a backdoor used by People’s Republic of China state-sponsored actors to maintain long-term access in VMware vSphere and Windows environments in U.S. critical infrastructure, from cloud platforms to data centers. CISA described BRICKSTORM as tailored for persistence in virtualization stacks, exactly where a lot of U.S. government and telecom workloads quietly live.Within hours of the React2Shell disclosure, HackerNews reporting relayed by the WIU Cybersecurity Center said two Chinese-linked groups weaponized the bug to gain unauthenticated remote code execution on internet-facing React apps. Think everything from SaaS dashboards to internal admin consoles suddenly turning into drive‑through backdoors. At the same time, CISA added an OSGeo GeoServer XXE flaw, CVE‑2025‑58360, to the exploited list, noting active attacks that could expose sensitive geospatial data—gold for Beijing-linked espionage focused on logistics, bases, and pipelines.Layer onto that the long-running Chinese APT ecosystem. Huntress threat profiles recap groups like Wicked Panda, Vixen Panda, and Vault Panda, all historically aligned with Chinese intelligence priorities: stealing defense designs, telecom metadata, and government emails. BRICKSTORM looks like the next-gen tool in that same toolbox.So what does “red alert” mean for you right now? First, if you run React Server Components, patch to React 19.0.1, 19.1.2, or 19.2.1 immediately and rotate secrets. Lock down GeoServer, update to a fixed build, and isolate it from core networks. Audit VMware vSphere and Windows cloud workloads for unknown services, suspicious scheduled tasks, and odd management traffic—exactly the habitats BRICKSTORM prefers. Follow CISA emergency directives: prioritize everything on the Known Exploited Vulnerabilities list before chasing shiny new CVEs.Escalation scenarios are straightforward and ugly: Chinese operators pivot from quiet access to disruptive options—ransomware partners, data wipers, or pressure on U.S. infrastructure during a Taiwan or South China Sea crisis, as analysts at Security Affairs and maritime security outlets have been warning in broader PRC strategy pieces.I’m Ting, thanks for tuning in—stay patched, stay paranoid, and don’t forget to subscribe for more deep dives into China, cyber, and the weird places they intersect. This has been a quiet please production, for more check out quiet please dot ai.For more http://www.quietplease.aiGet the best deals https://amzn.to/3ODvOtaThis content was created in partnership and with the help of Artificial Intelligence AI

More episodes of the podcast Red Alert: China's Daily Cyber Moves