{"id":6420,"date":"2025-12-16T09:13:57","date_gmt":"2025-12-16T09:13:57","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/12\/16\/react2shell-vulnerability-actively-exploited-to-deploy-linux-backdoors\/"},"modified":"2025-12-16T09:13:57","modified_gmt":"2025-12-16T09:13:57","slug":"react2shell-vulnerability-actively-exploited-to-deploy-linux-backdoors","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/12\/16\/react2shell-vulnerability-actively-exploited-to-deploy-linux-backdoors\/","title":{"rendered":"React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors"},"content":{"rendered":"<p>\u200bThe security vulnerability known as React2Shell is being exploited by threat actors to deliver malware families like KSwapDoor and ZnDoor, according to findings from Palo Alto Networks Unit 42 and NTT Security.<br \/>\n&#8220;KSwapDoor is a professionally engineered remote access tool designed with stealth in mind,&#8221; Justin Moore, senior manager of threat intel research at Palo Alto Networks Unit 42, said in a\u00a0The security vulnerability known as React2Shell is being exploited by threat actors to deliver malware families like KSwapDoor and ZnDoor, according to findings from Palo Alto Networks Unit 42 and NTT Security.<br \/>\n&#8220;KSwapDoor is a professionally engineered remote access tool designed with stealth in mind,&#8221; Justin Moore, senior manager of threat intel research at Palo Alto Networks Unit 42, said in a\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThe security vulnerability known as React2Shell is being exploited by threat actors to deliver malware families like KSwapDoor and ZnDoor, according to findings from Palo Alto Networks Unit 42 and NTT Security. &#8220;KSwapDoor is a professionally engineered remote access tool designed with stealth in mind,&#8221; Justin Moore, senior manager of threat intel research at Palo&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/12\/16\/react2shell-vulnerability-actively-exploited-to-deploy-linux-backdoors\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":6421,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6420"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=6420"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6420\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/6421"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=6420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=6420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=6420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}