Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Hackers exploit React2Shell in automated credential theft campaign
    Cybersecurity

    Hackers exploit React2Shell in automated credential theft campaign

    adminBy adminApril 5, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Hackers exploit React2Shell in automated credential theft campaign
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Hackers exploit React2Shell in automated credential theft campaign

    Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable Next.js apps.

    At least 766 hosts across various cloud providers and geographies have been compromised to collect database and AWS credentials, SSH private keys, API keys, cloud tokens, and environment secrets.

    The operation uses a framework named NEXUS Listener and leverages automated scripts to extract and exfiltrate sensitive data from various applications.

    Cisco Talos attributes the activity to a threat cluster tracked as UAT-10608. The researchers gained access to an exposed NEXUS Listener instance, allowing them to analyze the type of data harvested from compromised systems and understand how the web application operates.

    The main panel of Nexus Listener
    The main panel of Nexus Listener
    Source: Cisco Talos

    Automated secret harvesting

    The attack begins with automated scanning for vulnerable Next.js apps, which are breached via the React2Shell vulnerability. A script that executes a multi-phase credential-harvesting routine is placed in the standard temporary directory.

    According to Cisco Talos researchers, the data stolen this way includes:

    • Environment variables and secrets (API keys, database credentials, GitHub/GitLab tokens)
    • SSH keys
    • Cloud credentials (AWS/GCP/Azure metadata, IAM credentials)
    • Kubernetes tokens
    • Docker/container information
    • Command history
    • Process and runtime data

    Sensitive data is exfiltrated in chunks, each sent via an HTTP request over port 8080 to a command-and-control (C2) server running the NEXUS Listener component. The attacker is then provided with a detailed view of the data, including search, filtering, and statistical insights.

    “The application contains a listing of several statistics, including the number of hosts compromised and the total number of each credential type that were successfully extracted from those hosts,” Cisco Talos says in a report this week.

    “It also lists the uptime of the application itself. In this case, the automated exploitation and harvesting framework was able to successfully compromise 766 hosts within a 24-hour period.”

    Volume of secrets collected in the campaign
    Volume of secrets collected in the campaign
    Source: Cisco Talos

    Defense recommendations

    The stolen secrets allow attackers to perform cloud account takeover and access databases, payment systems, and other services, also opening the door to supply chain attacks. SSH keys could be used for lateral movement.

    Cisco highlights that the compromised data, including personally identifiable details, also exposes victims to regulatory consequences from privacy law violations.

    The researchers recommend that system administrators apply the security updates for React2Shell, audit server-side data exposure, and rotate all credentials immediately if there is suspicion of a compromise.

    Also, it is recommended to enforce AWS IMDSv2 and replace any reused SSH keys. They should also enable secret scanning, deploy WAF/RASP protections for Next.js, and enforce least-privilege across containers and cloud roles to limit impact.


    tines

    Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

    This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.

    automated Campaign credential exploit hackers React2Shell theft
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleI made Claude slower and it completely changed how I use it
    Next Article Iran-linked hackers use Cold War tricks and fake online identities to steal secrets from Apple and Microsoft users
    admin
    • Website

    Related Posts

    Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face

    April 16, 2026

    How to Use Google Ads Brand Guidelines for Cleaner Automated Assets

    April 16, 2026

    OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    ChatGPT Often Retrieves But Rarely Cites Reddit Pages, Data Shows

    April 16, 2026

    Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face

    April 16, 2026

    How to Use Google Ads Brand Guidelines for Cleaner Automated Assets

    April 16, 2026

    Dragon City: Mobile Adventure 26.5.0 APK Download by Social Point

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,347)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (828)
    • Tech Tools & Mobile / Apps (1,612)
    • WiFi / Internet & Networking (226)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    ChatGPT Often Retrieves But Rarely Cites Reddit Pages, Data Shows

    April 16, 2026

    Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face

    April 16, 2026

    How to Use Google Ads Brand Guidelines for Cleaner Automated Assets

    April 16, 2026
    Most Popular
    • ChatGPT Often Retrieves But Rarely Cites Reddit Pages, Data Shows
    • Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face
    • How to Use Google Ads Brand Guidelines for Cleaner Automated Assets
    • Dragon City: Mobile Adventure 26.5.0 APK Download by Social Point
    • OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal
    • Gemini blocked more than 99% of bad ads before they ran in 2025
    • I tested the Moto G Stylus 2026, and it’s finally starting to feel like an affordable alternative to the Galaxy S26 Ultra, but the price tag makes it a tougher sell
    • IBM unveils security services for thwarting agentic attacks, automating threat assessment
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.