Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NGINX Vulnerability Exploited in Web Traffic Hijacking

NGINX Vulnerability Exploited in Web Traffic Hijacking

Posted on February 5, 2026 By CWS

Recent findings by cybersecurity experts have unveiled a significant web traffic hijacking campaign exploiting NGINX installations and management interfaces like Baota. The campaign aims to reroute web traffic through servers controlled by the attackers, posing a substantial threat to internet security.

React2Shell Exploitation

Datadog Security Labs identified that the perpetrators of this campaign are leveraging the React2Shell (CVE-2025-55182) vulnerability with a critical CVSS score of 10.0. The attackers utilize malicious NGINX configurations to intercept legitimate web requests, diverting them through their own backend systems.

Security researcher Ryan Simon highlighted that the campaign targets specific top-level domains (TLDs) such as .in, .id, .pe, .bd, and .th, alongside Chinese hosting services like the Baota Panel, as well as government and educational domains (.edu, .gov).

Malicious NGINX Configurations

The attackers employ shell scripts to embed harmful configurations within NGINX, an open-source tool used for web traffic management. These configurations manipulate incoming requests on designated URL paths, redirecting them to attacker-operated domains using the “proxy_pass” command.

The toolkit includes several scripts designed to maintain persistence and generate malicious NGINX configurations. Key components include zx.sh, bt.sh, 4zdh.sh, zdh.sh, and ok.sh, each with specific functions ranging from orchestrating attacks to modifying NGINX settings and reporting active hijacking rules.

Emerging Threats and Analysis

GreyNoise’s analysis revealed two dominant IP addresses—193.142.147[.]209 and 87.121.84[.]24—responsible for over half of the exploitation attempts following the public disclosure of React2Shell. Between January 26 and February 2, 2026, 1,083 unique IP addresses were implicated in these attacks.

These sources deploy varied post-exploitation tactics, including cryptomining binary retrieval and direct reverse shell access, indicating a preference for interactive engagement over automated processes. Moreover, the campaign coincides with a broader reconnaissance effort against Citrix ADC Gateway and Netscaler Gateway infrastructures, employing extensive residential proxies and a Microsoft Azure IP address for login panel discovery.

The operation features two distinct phases: a widespread proxy-based login discovery and an AWS-hosted version enumeration sprint, suggesting a coordinated reconnaissance strategy.

This revelation underscores the critical need for robust security measures to safeguard web servers and prevent unauthorized access, emphasizing the importance of staying updated on emerging threats and vulnerabilities.

The Hacker News Tags:Baota Panel, Cybersecurity, Datadog Security Labs, malicious configurations, NGINX, React2Shell, shell scripts, traffic hijacking, Vulnerability, web security

Post navigation

Previous Post: New Malvertising Threat Exploits Facebook Ads for Scams
Next Post: DNS TXT Records Exploited in Advanced Cyber Attacks

Related Posts

OpenAI Introduces Daybreak for Enhanced Cyber Security OpenAI Introduces Daybreak for Enhanced Cyber Security The Hacker News
Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk The Hacker News
CPUID Breach: STX RAT Spread via Compromised Downloads CPUID Breach: STX RAT Spread via Compromised Downloads The Hacker News
Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign The Hacker News
Apple Widens iOS 18.7.7 Update to Shield Against DarkSword Apple Widens iOS 18.7.7 Update to Shield Against DarkSword The Hacker News
WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark