<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>When a single domain shows up repeatedly in security telemetry, it is rarely random. One of the clearest examples we have right now is <span><strong>api[.]qtss[.]cc</strong></span>, a domain tied to active exploitation of the critical React Server Components remote code execution vulnerability known as <span style="font-weight: normal;">React2Shell</span> (CVE 2025-55182). Multiple threat research teams have documented api[.]qtss[.]cc as command and control infrastructure for a Go based implant used after successful exploitation.<span>&nbsp; </span><span></span></p> <!--more--><p>At ThreatSTOP, we treat domains like this as an early warning signal and an opportunity to stop the threat where it is easiest to stop: <span style="font-weight: normal;">before connections are established</span>. Our Protective DNS solutions and IP Defense are built to disconnect systems from hostile infrastructure -&nbsp;preventing command execution, follow on payload delivery, and data theft paths that depend on outbound connectivity.</p> <h3><strong>Why api[.]qtss[.]cc matters right now</strong></h3> <p>React2Shell is not a theoretical issue. It is a critical, unauthenticated remote code execution vulnerability in React Server Components, rated CVSS 10.0, and it has been widely targeted since public disclosure.<span>&nbsp; </span><span></span></p> <p>Trend Micro reported <a href="https://www.trendmicro.com/en_us/research/25/l/CVE-2025-55182-analysis-poc-itw.html" rel="noopener" target="_blank">a surge</a> in exploitation attempts during <span style="font-weight: normal;">December 5 through December 8, 2025</span>, with multiple distinct campaigns emerging quickly after disclosure, including botnet activity and post exploitation tool deployment.<span>&nbsp; </span><span></span></p> <p>Within that broader exploitation wave, api[.]qtss[.]cc stands out because it has been associated with post exploitation control. Trend Micro observed a suspicious Go based backdoor that provides reverse shell capability, SOCKS5 proxying, and system reconnaissance, and they explicitly noted that it <span style="font-weight: normal;">used api[.]qtss[.]cc as a command and control server.</span><span><span style="font-weight: normal;">&nbsp;</span> </span><span></span></p> <p>Huntress independently <a href="https://www.huntress.com/blog/peerblight-linux-backdoor-exploits-react2shell" rel="noopener" target="_blank">reported</a> a Go based implant they named <span><strong>ZinFoq</strong></span>, describing api[.]qtss[.]cc as the command and control host used over HTTPS, along with distinct beacon, response, and file exfiltration endpoints.<span> &nbsp;</span></p> <h3><strong>React2Shell in plain language</strong></h3> <p>React2Shell (CVE 2025-55182) impacts React Server Components and related frameworks that rely on the affected React Server Components packages. The React team <a href="https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components" rel="noopener" target="_blank">described</a> it as an unauthenticated remote code execution vulnerability stemming from a flaw in how React decodes payloads sent to React Server Function endpoints, and noted that some applications may still be impacted if they support React Server Components even if they do not explicitly implement server function endpoints.<span>&nbsp;</span><span></span></p> <p>Microsoft’s <a href="https://www.microsoft.com/en-us/security/blog/2025/12/15/defending-against-the-cve-2025-55182-react2shell-vulnerability-in-react-server-components/" rel="noopener" target="_blank">analysis</a> explains the practical exploitation flow: an attacker sends a crafted POST request to a vulnerable web application, the payload is processed as a serialized object, and the server side deserialization results in attacker controlled code execution under NodeJS.<span></span></p> <p>The takeaway is simple: if you run vulnerable React Server Components functionality on an internet facing service, you should assume it will be probed and potentially exploited unless patched.</p> <h3><strong>Where api[.]qtss[.]cc fits in the attack chain</strong></h3> <p>Exploitation is only the beginning. Once a threat actor gains code execution, they typically move quickly to establish repeatable access and expand their reach.</p> <h4><strong>Post exploitation tooling and control</strong></h4> <p>Trend Micro observed multiple types of follow on activity during the React2Shell exploitation wave, including deployment of common offensive tooling and malware families.<span>&nbsp; </span><span></span></p> <p>One of the most relevant observations for api[.]qtss[.]cc is the Go based backdoor Trend Micro described. Its capabilities included:</p> <ul> <li> <p>Reverse shell functionality</p> </li> <li> <p>SOCKS5 proxying for pivoting</p> </li> <li> <p>System reconnaissance</p> </li> <li> <p>HTTP POST based command and control communications</p> </li> <li> <p>Attempts to clear shell history to reduce visibility</p> </li> </ul> <p>Trend Micro also stated the backdoor was hosted at <span><strong>45.76.155[.]14</strong></span> (which has changed) and used <span><strong>api[.]qtss[.]cc</strong></span> for command and control.<span>&nbsp; </span><span></span></p> <p><span>From our telemetry the amount of traffic we're blocking is only increasing. &nbsp;Our data for the past 7 days looks like this (<em>forgive the data issue between 12-17 and 12-19</em>).</span></p> <p><img src="https://2548414.fs1.hubspotusercontent-na1.net/hubfs/2548414/ioc_timeline.png" width="2083" height="1183" loading="lazy" alt="Past 7 days" style="height: auto; max-width: 100%; width: 2083px;"></p> <p>Huntress’s ZinFoq analysis adds more context: the implant communicates over HTTPS to api[.]qtss[.]cc using HTTP POST, disguises itself with a Safari like User Agent, and includes dedicated mechanisms for check in, command output, and file exfiltration.<span>&nbsp; </span><span></span></p> <h4><strong>What this means for defenders and risk owners</strong></h4> <p>Domains like api[.]qtss[.]cc are not just indicators. They are operational dependencies. If a compromised host cannot reach its command and control destination, the threat actor loses interactive control, loses reliable tasking, and often loses the ability to exfiltrate data through their preferred channel.</p> <p>That is why we block domains like this aggressively, and why protective controls at the DNS and IP layers provide immediate value even while patching and incident response are in progress.</p> <h3><strong>Immediate actions to reduce exposure</strong></h3> <p>You do not need perfect certainty to act. The combination of active exploitation and documented command and control infrastructure means action should be swift and layered.</p> <h4><strong>1. Patch React and related frameworks immediately</strong></h4> <p>The React team recommends upgrading to fixed versions and provides patch guidance for affected releases.<span>&nbsp; </span><span></span></p> <p>For organizations using Next.js, the Vercel <a href="https://github.com/vercel/next.js/security/advisories/GHSA-9qr9-h5gf-34mp" rel="noopener" target="_blank">security</a> advisory lists patched stable versions and advises upgrading immediately.<span>&nbsp;</span></p> <h4><strong>2. Monitor for exploitation and suspicious outbound traffic</strong></h4> <p>Look for signs of command execution spawned from Node processes and anomalous downloads following suspicious web requests. Microsoft observed attackers running arbitrary commands and delivering follow on payloads after exploitation.<span>&nbsp; </span><span></span></p> <p>Also monitor for outbound connections to suspicious destinations such as api[.]qtss[.]cc, along with unusual HTTPS POST patterns from servers that should not initiate that kind of traffic. Huntress describes this exact communication style for ZinFoq.<span>&nbsp; </span><span></span></p> <h4><strong>3. Treat outbound DNS and IP connectivity as an enforcement point</strong></h4> <p>Most post exploitation tooling requires outbound reachability. This is where Protective DNS and IP block lists deliver fast containment value:</p> <ul> <li> <p>Stop domain resolution so the connection never begins</p> </li> <li> <p>Stop traffic to known hostile IPs even if an implant uses hard coded values or cached resolution</p> </li> </ul> <h4><strong>How ThreatSTOP protections disrupt this threat</strong></h4> <p>ThreatSTOP protections are written and maintained by the <span><strong>ThreatSTOP Security, Intelligence, and Research team</strong></span>. The team creates protection for command and control, invalid traffic, peer to peer communication, data exfiltration, phishing, SPAM, Distributed Denial of Service activity, and more.</p> <p>Here is how our products apply directly to threats connected to api[.]qtss[.]cc and React2Shell exploitation.</p> <p>Using the "<span style="font-weight: bold;">Active Malware - Domains</span><span style="font-weight: normal;">" and "<span style="font-weight: bold;">TS Originated - Core Threats - IPs</span><span style="font-weight: normal;">" Targets, both in the&nbsp;<span style="font-weight: bold;">Command and Control</span><span style="font-weight: normal;"> Bundle. &nbsp;</span></span></span></p> <h4><strong>Protective DNS with DNS Defense Cloud and DNS Defense</strong></h4> <p>Protective DNS blocks resolution of known malicious domains such as api[.]qtss[.]cc before a client can establish a session. This helps in multiple phases:</p> <ul> <li> <p>Preventing command and control check ins</p> </li> <li> <p>Preventing payload retrieval from hostile infrastructure</p> </li> <li> <p>Reducing opportunities for data exfiltration over web protocols</p> </li> </ul> <p>With <span><strong>DNS Defense Cloud</strong></span>, you get cloud delivered DNS protection using our DNS servers, ideal for distributed workforces and roaming endpoints. With <span><strong>DNS Defense</strong></span>, you keep DNS protection on your network using your own DNS servers while applying ThreatSTOP intelligence locally.</p> <h4><strong>IP protection with IP Defense</strong></h4> <p>Many modern implants are resilient. They may retry, rotate infrastructure, or fall back to direct IP connections. <span><strong>IP Defense</strong></span> extends proactive protection to routers, firewalls, IPS devices, cloud controls, and more by managing block lists where IP based enforcement matters most.</p> <p>This is especially valuable for:</p> <ul> <li> <p>Catching hard coded infrastructure such as known hosting IPs tied to malicious campaigns</p> </li> <li> <p>Applying consistent policy across mixed environments such as on prem networks and cloud workloads (Using our AWS WAF and AWS NFW solutions!)</p> </li> </ul> <h4><strong>Call to action</strong></h4> <p>For those interested in joining the ThreatSTOP family, or to learn more about our proactive protections for all environments, we invite you to visit our product page. Discover how our solutions can make a significant difference in your digital security landscape. We have pricing for all sizes of customers. Get started with a Demo today.</p> <h3><strong>MITRE ATT&amp;CK mapping matrix</strong></h3> <pre>&nbsp;</pre> <table style="border-collapse: collapse; table-layout: fixed; margin-left: auto; margin-right: auto; border: 1px solid #99acc2;" data-hsprotectcellspacing="0"> <tbody> <tr> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p><strong>Tactic</strong></p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p><strong>Technique</strong></p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p><strong>How it applies to this threat</strong></p> </td> </tr> <tr> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Initial Access</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>T1190 Exploit Public Facing Application</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>React2Shell enables unauthenticated remote code execution via crafted web requests to vulnerable React Server Components deployments.</p> </td> </tr> <tr> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Execution</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>T1059.004 Command and Scripting Interpreter Unix Shell</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Threat actors execute shell commands on compromised Linux systems after successful exploitation.</p> </td> </tr> <tr> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Execution</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>T1059.001 Command and Scripting Interpreter PowerShell</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Observed exploitation attempts include PowerShell based execution to deliver follow on payloads.</p> </td> </tr> <tr> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Command and Control</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>T1071.001 Application Layer Protocol Web Protocols</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>ZinFoq and related tooling communicate to api[.]qtss[.]cc over HTTPS using HTTP POST requests.</p> </td> </tr> <tr> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Command and Control</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>T1090 Proxy</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>The Go based implant includes SOCKS5 proxy capability to support network pivoting.</p> </td> </tr> <tr> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Command and Control</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>T1105 Ingress Tool Transfer</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Post exploitation activity commonly includes downloading scripts and binaries from attacker controlled infrastructure.</p> </td> </tr> <tr> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Persistence</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>T1543.002 Create or Modify System Process Systemd Service</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Observed campaigns include persistence via systemd services on Linux.</p> </td> </tr> <tr> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Defense Evasion</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>T1070.003 Indicator Removal Clear Command History</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Multiple analyses report attempts to clear shell history to reduce forensic visibility.</p> </td> </tr> <tr> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Credential Access</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>T1552.005 Unsecured Credentials Cloud Instance Metadata API</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Threat activity associated with this exploitation wave includes querying cloud metadata endpoints to obtain temporary credentials.</p> </td> </tr> <tr> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Exfiltration</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>T1041 Exfiltration Over C2 Channel</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Huntress documented dedicated exfiltration endpoints tied to the same command and control host api[.]qtss[.]cc.</p> </td> </tr> </tbody> </table> <pre><code>&nbsp;</code></pre> <p style="font-weight: bold;">Connect with Customers, Disconnect from Risks</p></span>