Hackers exploit React2Shell in automated credential theft campaign
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我得仔细阅读文章内容,抓住主要信息。 文章讲的是黑客利用React2Shell漏洞攻击Next.js应用,导致大量主机被入侵,窃取了数据库、AWS凭证、SSH密钥等敏感信息。他们使用了NEXUS Listener框架和自动化脚本进行数据提取和外泄。Cisco Talos将此活动归因于威胁集群UAT-10608,并建议管理员更新安全补丁、审计数据暴露情况、立即轮换凭证等。 总结的时候,我需要涵盖攻击方式、影响范围、使用的工具以及防御建议。控制在100字以内,所以要简洁明了。 可能的结构:黑客利用React2Shell漏洞攻击Next.js应用,导致766台主机被入侵,窃取了多种敏感数据。使用NEXUS Listener框架和自动化脚本。Cisco Talos建议更新补丁、审计数据、轮换凭证等。 这样应该能全面覆盖主要内容,同时符合字数限制。 </think> 黑客利用React2Shell漏洞攻击Next.js应用,窃取数据库、AWS凭证、SSH密钥等敏感数据。766台主机被入侵,使用NEXUS Listener框架和自动化脚本提取数据。Cisco Talos建议更新安全补丁、审计数据暴露情况并立即轮换凭证以应对威胁。 2026-4-5 14:30:19 Author: www.bleepingcomputer.com(查看原文) 阅读量:5 收藏

Hackers exploit React2Shell in automated credential theft campaign

Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable Next.js apps.

At least 766 hosts across various cloud providers and geographies have been compromised to collect database and AWS credentials, SSH private keys, API keys, cloud tokens, and environment secrets.

The operation uses a framework named NEXUS Listener and leverages automated scripts to extract and exfiltrate sensitive data from various applications.

Cisco Talos attributes the activity to a threat cluster tracked as UAT-10608. The researchers gained access to an exposed NEXUS Listener instance, allowing them to analyze the type of data harvested from compromised systems and understand how the web application operates.

The main panel of Nexus Listener
The main panel of Nexus Listener
Source: Cisco Talos

Automated secret harvesting

The attack begins with automated scanning for vulnerable Next.js apps, which are breached via the React2Shell vulnerability. A script that executes a multi-phase credential-harvesting routine is placed in the standard temporary directory.

According to Cisco Talos researchers, the data stolen this way includes:

  • Environment variables and secrets (API keys, database credentials, GitHub/GitLab tokens)
  • SSH keys
  • Cloud credentials (AWS/GCP/Azure metadata, IAM credentials)
  • Kubernetes tokens
  • Docker/container information
  • Command history
  • Process and runtime data

Sensitive data is exfiltrated in chunks, each sent via an HTTP request over port 8080 to a command-and-control (C2) server running the NEXUS Listener component. The attacker is then provided with a detailed view of the data, including search, filtering, and statistical insights.

“The application contains a listing of several statistics, including the number of hosts compromised and the total number of each credential type that were successfully extracted from those hosts,” Cisco Talos says in a report this week.

“It also lists the uptime of the application itself. In this case, the automated exploitation and harvesting framework was able to successfully compromise 766 hosts within a 24-hour period.”

Volume of secrets collected in the campaign
Volume of secrets collected in the campaign
Source: Cisco Talos

Defense recommendations

The stolen secrets allow attackers to perform cloud account takeover and access databases, payment systems, and other services, also opening the door to supply chain attacks. SSH keys could be used for lateral movement.

Cisco highlights that the compromised data, including personally identifiable details, also exposes victims to regulatory consequences from privacy law violations.

The researchers recommend that system administrators apply the security updates for React2Shell, audit server-side data exposure, and rotate all credentials immediately if there is suspicion of a compromise.

Also, it is recommended to enforce AWS IMDSv2 and replace any reused SSH keys. They should also enable secret scanning, deploy WAF/RASP protections for Next.js, and enforce least-privilege across containers and cloud roles to limit impact.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/hackers-exploit-react2shell-in-automated-credential-theft-campaign/
如有侵权请联系:admin#unsafe.sh