Servers Under Siege: React2Shell, BRICKSTORM, GlassWorm & ScadaBR—This Week’s Critical Fixes
- SISA Weekly Threat Watch -
SISA Weekly Threat Watch – our weekly feature brings to you a quick snapshot of all the major security vulnerabilities that posed a threat to organizations worldwide. These recurring actionable threat advisories will also provide information and recommendations that will help security teams take appropriate actions to defend against the latest and critical threats.
1. Core-server intrusions move center stage
Attackers are pivoting from end-user endpoints to the heart of enterprise infrastructure—virtualization stacks and internet-exposed Windows servers—where persistence buys long dwell time and broad reach. Tactics blend stealthy persistence, dead-drop C2, and identity abuse to quietly expand control.
BrickStorm backdoor on VMware vCenter — China-linked actors compromised DMZ web servers, laterally moved into vSphere/vCenter, dropped a Go-based BRICKSTORM implant on ESXi/vCenter, spun rogue VMs, stole snapshots/AD data, and abused ADFS keys for long-term access with encrypted HTTPS/WebSocket/DoH C2 and self-healing persistence.
PassiveNeuron SQL-path espionage — Opportunistic hits on internet-exposed Windows Server/SQL environments using NeuralExecutor/Neursite loaders, Cobalt Strike, GitHub dead-drops, and Phantom DLL hijacking to persist outside typical autoruns while focusing on government/industrial/financial targets.
2. App-layer RCE goes mass-exploitation
Framework-level flaws that work in default configs are being weaponized within hours, forcing emergency patch cycles and retroactive compromise assessments—patching alone isn’t enough.
React2Shell zero-day (CVE-2025-55182) — Insecure deserialization in React Server Components’ Flight protocol enables unauthenticated server-side JS execution on many React/Next.js apps; active, hands-on-keyboard exploitation by China-nexus clusters with public PoCs in circulation.
WordPress plugin criticals — King Addons for Elementor privilege escalation lets anyone self-assign admin via crafted
admin-ajax.php; Advanced Custom Fields: Extended RCE abusescall_user_func_array()for unauthenticated code execution—both already exploited in the wild.
3. APT Tradecraft: DNS/AitM & Long-Haul Loaders
State-aligned groups are shifting from simple phish to infrastructure-level hijack and multi-year, low-noise loaders.
- PlushDaemon EdgeStepper — Go backdoor on edge devices hijacks DNS to reroute software updates, delivering LittleDaemon → DaemonicLogistics → SlowStepper for espionage across semiconductor, manufacturing, and academia.
- APT24 “BadAudio” — Heavily-obfuscated DLL loader delivered via watering holes, a Taiwanese JS supply-chain breach, and themed spearphish; AES-encrypted beacons and in-memory payloads (incl. Cobalt Strike) with persistently low AV detection.
4. Developer supply chain under fire (again)
The dev toolchain remains a high-leverage entry point: marketplace trust, auto-updates, and wide blast radius make it ideal for stealthy spread and credential theft.
GlassWorm returns in VS Code/Open VSX — 24 malicious extensions impersonating popular tools ship Rust implants, resolve C2 via Solana (and even Google Calendar), then use stolen creds to backdoor repos and republish trojanized packages for worm-like propagation across Windows/macOS dev fleets.
5. ICS/OT web layers get picked off
Legacy web panels and default creds on HMI/SCADA are being abused for high-visibility defacement and low-effort disruption, while quietly degrading operator visibility.
OpenPLC ScadaBR XSS (CVE-2021-26829) actively exploited — TwoNet hacktivists logged in with defaults, injected JS via
system_settings.shtm, defaced HMI, and disabled logs/alerts; CISA moved the flaw to KEV amid broader ICS probing and region-focused scans.
Proactive Steps for the Week
Patch/disable now (highest priority)
React/Next.js: apply vendor fixes for React2Shell; if delayed, temporarily disable RSC Flight endpoints and add WAF rules to block malformed Flight payloads.
WordPress: update King Addons ≥ 51.1.35 and ACF: Extended ≥ 0.9.2; audit for rogue admin users, unexpected PHP files, and recent
admin-ajax.phpabuse.VMware stack: baseline vCenter/ESXi; hunt for unknown ELF/Go binaries, long-lived outbound HTTPS/WebSocket/DoH from management hosts, rogue VMs/snapshots, and ADFS key export events.
Hunt and contain (next 72 hours)
Windows Server/SQL: search for Phantom-path DLLs in
System32/service paths, suspicious SQL activity (e.g.,xp_cmdshelluse), Cobalt Strike beacons, and GitHub raw fetches from servers.Developer endpoints/CI: enumerate and remove the listed VS Code/Open VSX extensions; rotate GitHub/npm tokens, enforce MFA, and scan for Rust module loads from extension directories.
ICS/HMI: enforce password changes off defaults, segment panels, add WAF XSS rules for ScadaBR, and enable audit alerts for UI/file changes and log tampering.
Hardening to start this sprint
Restrict admin access to jump hosts/VPN with MFA; block unsanctioned DoH at egress.
Implement signed extensions/allow-lists for IDEs; require re-review on marketplace updates.
For SQL Server, disable unused features (e.g.,
xp_cmdshell), enforce TLS, and monitor for anomalous admin logins from the internet.Add detections for: React RSC anomalies, unexpected
node/interpreter spawns under web services, vCenter config changes outside change windows, and cookie- or calendar-based dead-drop patterns.
To get daily updates on the critical vulnerabilities being exploited by threat actors, subscribe to SISA Daily Threat Watch – our daily actionable threat advisories.
For a deeper understanding of how you can prevent these threats from affecting your organization, request a call to get in touch with our experts.
APAC

