Article Details

Scrape Timestamp (UTC): 2026-02-05 04:59:37.028

Source: https://thehackernews.com/2026/02/hackers-exploit-react2shell-to-hijack.html

Original Article Text

Click to Toggle View

Hackers Exploit React2Shell to Hijack Web Traffic via Compromised NGINX Servers. Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and management panels like Baota (BT) in an attempt to route it through the attacker's infrastructure. Datadog Security Labs said it observed threat actors associated with the recent React2Shell (CVE-2025-55182, CVSS score: 10.0) exploitation using malicious NGINX configurations to pull off the attack. "The malicious configuration intercepts legitimate web traffic between users and websites and routes it through attacker-controlled backend servers," security researcher Ryan Simon said. "The campaign targets Asian TLDs (.in, .id, .pe, .bd, .th), Chinese hosting infrastructure (Baota Panel), and government and educational TLDs (.edu, .gov)." The activity involves the use of shell scripts to inject malicious configurations into NGINX, an open-source reverse proxy and load balancer for web traffic management. These "location" configurations are designed to capture incoming requests on certain predefined URL paths and redirect them to domains under the attackers' control via the "proxy_pass" directive. The scripts are part of a multi-stage toolkit that facilitates persistence and the creation of malicious configuration files incorporating the malicious directives to redirect web traffic. The components of the toolkit are listed below - "The toolkit contains target discovery and several scripts designed for persistence and the creation of malicious configuration files containing directives intended to redirect web traffic. The disclosure comes as GreyNoise said two IP addresses – 193.142.147[.]209 and 87.121.84[.]24 – account for 56% of all observed exploitation attempts two months after React2Shell was publicly disclosed. A total of 1,083 unique source IP addresses have been involved in React2Shell exploitation between January 26 and February 2, 2026. "The dominant sources deploy distinct post-exploitation payloads: one retrieves cryptomining binaries from staging servers, while the other opens reverse shells directly to the scanner IP," the threat intelligence firm said. "This approach suggests interest in interactive access rather than automated resource extraction." It also follows the discovery of a coordinated reconnaissance campaign targeting Citrix ADC Gateway and Netscaler Gateway infrastructure using tens of thousands of residential proxies and a single Microsoft Azure IP address ("52.139.3[.]76") to discover login panels. "The campaign ran two distinct modes: a massive distributed login panel discovery operation using residential proxy rotation, and a concentrated AWS-hosted version disclosure sprint," GreyNoise noted. "They had complementary objectives of both finding login panels, and enumerating versions, which suggests coordinated reconnaissance."

Daily Brief Summary

VULNERABILITIES // React2Shell Exploit Targets NGINX Servers for Web Traffic Hijacking

Cybersecurity researchers identified an active campaign exploiting the React2Shell vulnerability (CVE-2025-55182) to hijack web traffic on compromised NGINX servers.

Attackers use malicious NGINX configurations to intercept and reroute legitimate web traffic through their own infrastructure, affecting Asian and government domains.

The exploitation involves shell scripts injecting malicious configurations into NGINX, redirecting traffic via the "proxy_pass" directive to attacker-controlled domains.

A multi-stage toolkit facilitates persistence and the creation of malicious configuration files, with 1,083 unique IP addresses involved in the exploitation efforts.

GreyNoise reported that two IP addresses account for 56% of observed exploitation attempts, indicating a concentrated effort by threat actors.

Post-exploitation payloads include cryptomining binaries and reverse shells, suggesting a focus on interactive access rather than automated resource extraction.

The campaign's discovery coincides with a coordinated reconnaissance effort targeting Citrix ADC and Netscaler Gateway infrastructures, highlighting a broader threat landscape.