Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。首先,我需要仔细阅读文章,抓住主要信息。 文章讲的是网络攻击活动,目标是NGINX安装和管理面板比如Baota。攻击者使用恶意配置劫持流量到自己的服务器。他们利用了React2Shell漏洞,CVSS评分很高,说明威胁很大。攻击主要针对亚洲的顶级域名和中国的基础设施。 然后,攻击工具包包括多个shell脚本,用来注入恶意配置、持久化和生成报告。GreyNoise提到两个IP地址占了56%的攻击尝试,还提到攻击者使用不同的后利用载荷,比如挖矿和反向shell。 还有另一个侦察活动针对Citrix ADC Gateway和Netscaler Gateway,使用大量代理和Azure IP来发现登录面板。 所以总结的时候要涵盖:攻击目标、方法、工具包、影响范围以及后续侦察活动。控制在100字以内,简洁明了。 </think> 研究人员披露了一项针对NGINX安装和管理面板(如Baota)的网络流量劫持活动,利用恶意配置将用户流量重定向至攻击者控制的服务器。该活动主要针对亚洲顶级域名(.in, .id等)、中国托管基础设施及政府和教育机构域名。攻击者通过shell脚本注入恶意配置文件,并利用React2Shell漏洞进行多阶段攻击。 2026-2-5 04:56:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Web Security / Vulnerability

Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and management panels like Baota (BT) in an attempt to route it through the attacker's infrastructure.

Datadog Security Labs said it observed threat actors associated with the recent React2Shell (CVE-2025-55182, CVSS score: 10.0) exploitation using malicious NGINX configurations to pull off the attack.

"The malicious configuration intercepts legitimate web traffic between users and websites and routes it through attacker-controlled backend servers," security researcher Ryan Simon said. "The campaign targets Asian TLDs (.in, .id, .pe, .bd, .th), Chinese hosting infrastructure (Baota Panel), and government and educational TLDs (.edu, .gov)."

The activity involves the use of shell scripts to inject malicious configurations into NGINX, an open-source reverse proxy and load balancer for web traffic management. These "location" configurations are designed to capture incoming requests on certain predefined URL paths and redirect them to domains under the attackers' control via the "proxy_pass" directive.

The scripts are part of a multi-stage toolkit that facilitates persistence and the creation of malicious configuration files incorporating the malicious directives to redirect web traffic. The components of the toolkit are listed below -

  • zx.sh, which acts as the orchestrator to execute subsequent stages through legitimate utilities like curl or wget. In the event that the two programs are blocked, it creates a raw TCP connection to send an HTTP request
  • bt.sh, which targets the Baota (BT) Management Panel environment to overwrite NGINX configuration files
  • 4zdh.sh, which enumerates common Nginx configuration locations and takes steps to minimize errors when creating the new configuration
  • zdh.sh, which adopts a narrower targeting approach by focusing mainly on Linux or containerized NGINX configurations and targeting top-level domains (TLDs) such as .in and .id
  • ok.sh, which is responsible for generating a report detailing all active NGINX traffic hijacking rules

"The toolkit contains target discovery and several scripts designed for persistence and the creation of malicious configuration files containing directives intended to redirect web traffic.

The disclosure comes as GreyNoise said two IP addresses – 193.142.147[.]209 and 87.121.84[.]24 – account for 56% of all observed exploitation attempts two months after React2Shell was publicly disclosed. A total of 1,083 unique source IP addresses have been involved in React2Shell exploitation between January 26 and February 2, 2026.

"The dominant sources deploy distinct post-exploitation payloads: one retrieves cryptomining binaries from staging servers, while the other opens reverse shells directly to the scanner IP," the threat intelligence firm said. "This approach suggests interest in interactive access rather than automated resource extraction."

It also follows the discovery of a coordinated reconnaissance campaign targeting Citrix ADC Gateway and Netscaler Gateway infrastructure using tens of thousands of residential proxies and a single Microsoft Azure IP address ("52.139.3[.]76") to discover login panels.

"The campaign ran two distinct modes: a massive distributed login panel discovery operation using residential proxy rotation, and a concentrated AWS-hosted version disclosure sprint," GreyNoise noted. "They had complementary objectives of both finding login panels, and enumerating versions, which suggests coordinated reconnaissance."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/hackers-exploit-react2shell-to-hijack.html
如有侵权请联系:admin#unsafe.sh