Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    ​​Methods to Stop Prior Authorization Delays

    March 3, 2026

    Well-liked Iranian App BadeSaba was Hacked to Ship “Assist Is on the Means” Alerts

    March 3, 2026

    MWC 2026 Updates: Information, Updates and Product Bulletins

    March 3, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»GitHub Scanner for React2Shell (CVE-2025-55182) Turns Out to Be Malware – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra
    AI Ethics & Regulation

    GitHub Scanner for React2Shell (CVE-2025-55182) Turns Out to Be Malware – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra

    Declan MurphyBy Declan MurphyDecember 16, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    GitHub Scanner for React2Shell (CVE-2025-55182) Turns Out to Be Malware – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    A GitHub repository posing as a vulnerability scanner for CVE-2025-55182, additionally known as “React2Shell,” was uncovered as malicious after spreading malware. The undertaking, named React2shell-scanner, was hosted below the person niha0wa and has since been faraway from the platform following group studies.

    Saurabh, a cybersecurity researcher, flagged the now-deleted software on LinkedIn final week after figuring out suspicious behaviour within the code. In line with his publish, the script included a hidden payload designed to execute mshta.exe and fetch a distant file from py-installer.cc, a recognized approach used to drop second-stage malware.

    Wanting on the script confirms the warning. The malware was embedded inside react2shellpy.py, the place a piece of base64-encoded strings was decoded right into a PowerShell command.

    The malware focused Home windows gadgets by utilizing mshta.exe, a authentic Home windows software usually abused to run malicious scripts, pointing to a malicious customized script hosted on GitHub. The script appeared to execute with out prompting the person or elevating suspicion.

    Screenshot of the pretend React2Shell (CVE-2025-55182) scanner script hosted on GitHub (Picture credit score: Saurabh by way of LinkedIn)

    The scanner was aimed toward safety professionals investigating CVE-2025-55182, introduced as one thing useful moderately than dangerous. By posing as a authentic safety utility, it turned regular analysis exercise into an entry level for compromise, placing cybersecurity researchers in danger.

    It’s price noting that this got here simply days after studies confirmed hackers hiding new PyStoreRAT malware inside utility instruments on GitHub, particularly concentrating on OSINT and cybersecurity researchers.

    Whereas GitHub acted shortly and eliminated the repository, the incident goes on to indicate that code shared below the banner of cybersecurity instruments must be reviewed with warning. Merely put, no software ought to be trusted blindly simply because it’s hosted on a well-known platform.

    Saurabh’s full warning could be discovered right here. He urged safety professionals to evaluation supply code completely earlier than executing any third-party instruments, particularly these claiming to help in vulnerability detection.

    Whereas the malicious script has been taken down, cached copies or forks should flow into. Researchers analysing CVE-2025-55182 or related high-interest vulnerabilities ought to keep alert for pretend exploit instruments, particularly these with obfuscated code, community callbacks or unclear authorship.



    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Well-liked Iranian App BadeSaba was Hacked to Ship “Assist Is on the Means” Alerts

    March 3, 2026

    New Chrome Vulnerability Let Malicious Extensions Escalate Privileges through Gemini Panel

    March 2, 2026

    MSHTML Zero-Day in Home windows Exploited by APT28 Previous to Feb 2026 Safety Replace

    March 2, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    ​​Methods to Stop Prior Authorization Delays

    By Hannah O’SullivanMarch 3, 2026

    Prior authorization was designed to make sure medical necessity and…

    Well-liked Iranian App BadeSaba was Hacked to Ship “Assist Is on the Means” Alerts

    March 3, 2026

    MWC 2026 Updates: Information, Updates and Product Bulletins

    March 3, 2026

    Fixing the Pupil Debt Disaster with U.S. Information CEO Eric Gertler

    March 3, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.