Hackers Exploit Vulnerability in Automated Credential Theft Campaigns

Hackers-Exploit-Vulnerability-in-Automated-Credential-Theft-Campaigns

Attackers Exploit React2Shell to Steal Credentials on Scale

In a significant cyberattack, hackers have developed a sophisticated scheme to automatically harvest sensitive credentials from vulnerable web applications using the React2Shell vulnerability (CVE-2025-55182).

The Malicious Campaign

  • The malicious campaign has already compromised at least 766 hosts across multiple cloud providers and geographical locations.
  • The unauthorized collection of database and AWS credentials, SSH private keys, API keys, cloud tokens, and environment secrets.

The Attack Process

The threat actors employ a custom-built framework called NEXUS Listener, which enables the automated extraction and exfiltration of sensitive data from compromised systems.

The attackers deploy a script that conducts a multi-stage credential-harvesting process. This process involves:• Collecting environment variables and secrets• Extracting SSH keys• Gathering cloud credentials• Obtaining Kubernetes tokens• Retrieving docker/container information

The Impact of the Compromise

The stolen credentials pose significant risks, enabling attackers to:

en_USEnglish