Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Dirty Frag Linux Vulnerability Allows Root Privileges Access
May 8, 2026
Next.js & React Server Components: Critical Vulnerabilities Pat
May 8, 2026
Ivanti EPMM 0-Day Vulnerability Actively Exploited Attacks
May 7, 2026
Home/Threats/Hackers Exploit Next.js React2Shell Flaw to Steal Credentials From
Threats

Hackers Exploit Next.js React2Shell Flaw to Steal Credentials From

A critical security flaw, dubbed React2Shell, is under active exploitation by attackers targeting web applications built on the widely used Next.js framework. This cyberattack campaign is rapidly...

Jennifer sherman
Jennifer sherman
April 7, 2026 3 Min Read
3 0

A critical security flaw, dubbed React2Shell, is under active exploitation by attackers targeting web applications built on the widely used Next.js framework. This cyberattack campaign is rapidly impacting websites across the internet.

In just 24 hours, attackers broke into 766 servers and walked away with massive amounts of sensitive data, including passwords, cloud keys, and database credentials.

The vulnerability at the center of this attack is CVE-2025-55182, widely known as React2Shell. Rated a maximum severity score of 10.0 on the CVSS scale, the flaw exists in the React Server Components (RSC) Flight protocol, specifically in how a React server processes HTTP requests to Server Function endpoints.

A single crafted HTTP request is enough for an attacker to execute code on the server with no authentication required. Next.js also received a separate tracking number, CVE-2025-66478, given its significant downstream exposure to this flaw.

Cisco Talos researchers identified this automated operation and tied it to a threat cluster they are now tracking as UAT-10608.

The campaign is both systematic and indiscriminate, with attackers using scanning services such as Shodan or Censys to sweep the internet for publicly reachable Next.js deployments running vulnerable versions of React Server Components.

Once a target is located, the entire attack runs on its own, requiring no manual interaction after the initial exploit fires.

The scale of damage is significant. Across multiple geographic regions and cloud providers including AWS, Google Cloud, and Microsoft Azure, at least 766 hosts were confirmed breached within a single 24-hour window.

Stolen material included database connection strings, SSH private keys, cloud access tokens, GitHub tokens, Stripe live secret keys, Kubernetes service account credentials, environment variables, and shell command histories.

More than 10,120 files in total were collected from the compromised systems. The reach of this campaign extends well beyond immediate account takeover.

Several breached hosts exposed package registry authentication files, including npm and pip configuration files that carried registry credentials.

If attackers use these tokens to push malicious versions of trusted software packages, the harm can reach any organization that installs those packages, turning this into a genuine supply chain threat.

The NEXUS Listener: How Stolen Data Is Controlled at Scale

To manage the flood of stolen information pouring in from hundreds of servers, UAT-10608 deployed a custom command-and-control framework called NEXUS Listener.

This web-based platform, currently at version 3, provides operators with a graphical dashboard where they can browse compromised hosts, sort stolen credentials by category, review harvesting statistics, and check how many credentials were successfully extracted in each attack phase.

NEXUS Listener homepage with statistics (Source - Cisco Talos)
NEXUS Listener homepage with statistics (Source – Cisco Talos)

The attack begins when a vulnerable endpoint is identified and a single malicious HTTP request is sent to the RSC Server Function endpoint.

The server deserializes the crafted payload and runs arbitrary code, dropping a lightweight shell script into a temp directory under a randomized file name to stay hidden.

That dropper then retrieves a multi-phase credential harvesting script from the attacker’s infrastructure.

NEXUS Listener victims list (Source - Cisco Talos)
NEXUS Listener victims list (Source – Cisco Talos)

Each phase collects a different type of data, from SSH keys and cloud tokens to database passwords, and reports back to the NEXUS Listener C2 server on port 8080, including the victim’s hostname and a phase identifier.

NEXUS Listener individual victim credentials (Source - Cisco Talos)
NEXUS Listener individual victim credentials (Source – Cisco Talos)

No further human interaction is needed, which is how UAT-10608 breached hundreds of systems so quickly.

Organizations running Next.js with App Router or any implementation of React Server Components should apply patches to the latest available version without delay.

All secrets in potentially affected environments, including AWS keys, database passwords, SSH keys, API tokens, and GitHub tokens, must be rotated immediately.

Teams should audit containers for overly permissive roles, enforce IMDSv2 on cloud instances, and stop reusing SSH key pairs across different systems.

Monitoring outbound HTTP traffic from application containers, especially unexpected connections to unknown IPs on port 8080, is a practical and important step toward catching an active breach early.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCVEExploitHackerPatchSecurityThreatVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

ClickFix Lure Drops Node.js Windows RAT with Tor Hackers Node.js-Based

Next Post

Fake Gemini npm Package Steals Tokens From Claude, AI Tools

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Use Fake Claude AI Installers to Infect Systems
May 7, 2026
UAT-8302 Uses Custom Malware and Open-Source Tools to Steal Data
May 7, 2026
Scammers Evade Blocking Using VoIP and Reused Windows
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us