Critical React2Shell and MongoDB flaws reveal how attackers exploit trust.
ThreatLocker: Zero Trust Weekly

This week in Zero Trust

Here are your weekly tips to stay ahead of cyber threats.

Estimated reading time: 5-6 minutes

 

In this issue:

  • Why EDR and XDR aren't enough: The limits of detection-based security.
  • Tampa Bay manufacturer files lawsuit over breach: Former exec accesses proprietary files after their termination.
  • From React2Shell to cryptomining compromise: Vulnerability allows unauthenticated remote code execution.
  • Threats you need to know: A critical MongoDB flaw and a malicious Chrome extension.
View in browser

Manage preferences

From the CEO

Audit your applications for hidden risks

 

The majority of organizations are running far more software than they realize, and among them could be programs introducing serious security risks.

 

"Origin matters. Browser extensions or utilities developed in unfriendly nation-states can carry hidden threats. Companies should regularly review their application lists, assess the business need for each, and weigh the potential security risks. Anything that isn't needed should be blocked." - Danny Jenkins

From the ThreatLocker blog

Read about where detection falls short, access lingers, and unpatched systems get exploited

 

Why EDR and XDR alone fall short

  • What you need to know: Most EDR and XDR tools focus on detecting and responding to threats after malicious activity begins. Attackers can execute fileless malware, LOTL techniques, or ransomware payloads before these tools trigger a response.  
  • Why it matters: Threats can evade detection-based tools by blending malicious behavior into legitimate processes or trusted apps. Detect first and react second gives attackers valuable time to escalate privileges, move laterally, exfiltrate data, or deploy ransomware. 
  • Key takeaways: Detection tools are necessary but shouldn't be the foundation of a cybersecurity strategy. Zero Trust tools like Allowlisting and ThreatLocker Ringfencing™ enforce strict execution policies so only approved applications can run, and they can only access what is deemed necessary by your security team. 

Manufacturer files lawsuit after fired executive accessed cloud data

  • What you need to know: A manufacturer in Tampa Bay filed a federal lawsuit after a former executive reportedly accessed proprietary files stored in the cloud. The incident underscores growing legal and operational risks tied to insider misuse and insufficient account controls.
  • Why it matters: Once proprietary data is accessed or copied, it can't be "resecured." Insider threats, especially involving privileged access, are among the costliest and most damaging types of breaches. Financial loss, intellectual property exposure, and compromised business data can all result in litigation, company closure, reputational damage, and regulatory scrutiny. 
  • What you can do: Insider access doesn't end when employment does. Disable accounts immediately, revoke access, and audit cloud repositories for unusual activity following employment changes.

React2Shell goes from web bug to a Windows breach

  • What you need to know: Unauthenticated remote code execution on unpatched web servers made possible because of a critical vulnerability in React Server Components (CVE-2025-55182, aka React2Shell). Threat actors have been using this flaw to pivot from a web app to full Windows compromise, executing arbitrary commands and attempting cryptomining payload deployment.
  • Why it matters: Unpatched infrastructure exposed to the internet can become a launching pad for attacks that escalate into deeper system compromise. A single overlooked vulnerability in widely used components can transition from a web-layer flaw to a host-level breach with broad impact.
  • What you can do: React2Shell is a critical severity (CVSS score of 10.0) RCE vulnerability that requires immediate patching. Prioritize patch management and vulnerability scanning for all server-side frameworks, even in deployment, staging, and production environments. 

Threats you need to know

Where exposed systems and trusted software become attack paths

  1. New MongoDB flaw exposes unauthenticated memory access 
    • What you need to know: A high-severity vulnerability in MongoDB (CVE-2025-14847, CVSS 8.7) allows attackers to read uninitialized heap memory from affected database servers. The flaw is caused by improper handling of mismatched length parameters in zlib-compressed protocol headers and impacts a wide range of MongoDB versions, including legacy releases.
    • Why it matters: This vulnerability represents a direct exposure risk for any MongoDB instance that is internet-facing or insufficiently segmented. Memory disclosure flaws can leak sensitive internal data, credentials, or system state information that attackers can use to escalate access, bypass controls, or chain additional exploits.
    • Key takeaways: Upgrade to a patched MongoDB version, and if patching isn't available, disable zlib compression. Audit environments for externally accessible databases and enforce least privilege to reduce blast radius across environments or client infrastructures.
  2. Trust Wallet Chrome extension breach leads to $7M crypto theft 
    • What you need to know: Trust Wallet disclosed a security incident affecting its Chrome extension 2.68 in which malicious code harvested mnemonic phrases and exfiltrated them to attacker-controlled servers. This breach resulted in approximately $7 million in stolen cryptocurrency.
    • Why it matters: Extensions often operate with overly broad permissions, handle sensitive data, and update automatically, making them an attractive target for supply-chain compromise. A single malicious extension update can bypass endpoint protections and give attackers direct access to credentials, session data, or other sensitive information across an organization.
    • Key takeaways: Browser extensions should be treated as high-risk assets. Monitor updates closely and limit access to sensitive credentials wherever possible.

Live webinars with Zero Trust experts

Applying Zero Trust principles to prevention and response

 

Watch now: Eliminate breaches caused by misconfigurations

 

Configuration errors are one of the biggest security risks facing organizations today. ThreatLocker makes it easier for you to spot them, fix them, and map your improvements directly to compliance frameworks. 

 

What is covered:

  • A hands-on demo of Defense Against Configurations (DAC).
  • Strategies to reduce risk and simplify your compliance.
  • How to apply configuration checks across your environment.

Watch now: Hardened incident response framework

 

Attackers evolve right alongside cybersecurity strategy, meaning a robust incident response framework is crucial for every organization. It's a critical component in mitigating an attack and showcasing due diligence in the event of a lawsuit. 

 

Steps to take:

  • Set up automated responses in your EDR.
  • Create a runbook for your MDR.
  • Check out Cloud Control to stop unauthorized logins.
ThreatLocker Zero Trust World 2026, Orlando, FL, March 4-6

Three days that give you the power to better protect your organization

 

ZTW is built to strengthen your defenses from every angle. Sessions and hacking labs for this year's event include:

  • CISO Series Live with David Spark
  • Rubber Ducky Basic and Advanced
  • Cybersecurity lessons from Independence Day with the PC Security Channel
  • The Buy-the-Breach method explained with Chase Cunningham, Dr. Zero Trust
Register now with code ZTWWEEKLY26 to save $200

"Zero Trust World is an amazing event and an opportunity to meet with everyone else that is part of this information war we're in against threat actors and helping understand how we can protect our clients better. I love the hands-on labs that they offer to really allow us to get technical in the weeds."  - Brian Weiss, CEO & Founder, ITECH Solutions

Cyber Hero Frontline, a magazine by ThreatLocker

Read more about:

  • Insider threats and the silent cybersecurity danger
  • Lifestyle tweaks for energy, focus, and recovery
  • Defense in depth without allowlisting

Read it online or have a print copy mailed to you (or a friend!) at no charge. 

Read Cyber Hero Frontline Issues 1 and 2
ThreatLocker: Zero Trust Platform | Zero Trust Weekly

ThreatLocker, 1950 Summit Park Dr, Floor 4, Orlando, Florida 32810, United States

Manage preferences

Connect with us

                             

©2026 ThreatLocker Inc., All Rights Reserved