Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NGINX Vulnerability Exploited in Web Traffic Hijacking

NGINX Vulnerability Exploited in Web Traffic Hijacking

Posted on February 5, 2026 By CWS

Recent findings by cybersecurity experts have unveiled a significant web traffic hijacking campaign exploiting NGINX installations and management interfaces like Baota. The campaign aims to reroute web traffic through servers controlled by the attackers, posing a substantial threat to internet security.

React2Shell Exploitation

Datadog Security Labs identified that the perpetrators of this campaign are leveraging the React2Shell (CVE-2025-55182) vulnerability with a critical CVSS score of 10.0. The attackers utilize malicious NGINX configurations to intercept legitimate web requests, diverting them through their own backend systems.

Security researcher Ryan Simon highlighted that the campaign targets specific top-level domains (TLDs) such as .in, .id, .pe, .bd, and .th, alongside Chinese hosting services like the Baota Panel, as well as government and educational domains (.edu, .gov).

Malicious NGINX Configurations

The attackers employ shell scripts to embed harmful configurations within NGINX, an open-source tool used for web traffic management. These configurations manipulate incoming requests on designated URL paths, redirecting them to attacker-operated domains using the “proxy_pass” command.

The toolkit includes several scripts designed to maintain persistence and generate malicious NGINX configurations. Key components include zx.sh, bt.sh, 4zdh.sh, zdh.sh, and ok.sh, each with specific functions ranging from orchestrating attacks to modifying NGINX settings and reporting active hijacking rules.

Emerging Threats and Analysis

GreyNoise’s analysis revealed two dominant IP addresses—193.142.147[.]209 and 87.121.84[.]24—responsible for over half of the exploitation attempts following the public disclosure of React2Shell. Between January 26 and February 2, 2026, 1,083 unique IP addresses were implicated in these attacks.

These sources deploy varied post-exploitation tactics, including cryptomining binary retrieval and direct reverse shell access, indicating a preference for interactive engagement over automated processes. Moreover, the campaign coincides with a broader reconnaissance effort against Citrix ADC Gateway and Netscaler Gateway infrastructures, employing extensive residential proxies and a Microsoft Azure IP address for login panel discovery.

The operation features two distinct phases: a widespread proxy-based login discovery and an AWS-hosted version enumeration sprint, suggesting a coordinated reconnaissance strategy.

This revelation underscores the critical need for robust security measures to safeguard web servers and prevent unauthorized access, emphasizing the importance of staying updated on emerging threats and vulnerabilities.

The Hacker News Tags:Baota Panel, Cybersecurity, Datadog Security Labs, malicious configurations, NGINX, React2Shell, shell scripts, traffic hijacking, Vulnerability, web security

Post navigation

Previous Post: New Malvertising Threat Exploits Facebook Ads for Scams
Next Post: DNS TXT Records Exploited in Advanced Cyber Attacks

Related Posts

Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies The Hacker News
GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections The Hacker News
New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP The Hacker News
Unpatched Firmware Flaw Exposes TOTOLINK EX200 to Full Remote Device Takeover Unpatched Firmware Flaw Exposes TOTOLINK EX200 to Full Remote Device Takeover The Hacker News
Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android The Hacker News
Critical Metro4Shell Vulnerability Exploited in React Native Critical Metro4Shell Vulnerability Exploited in React Native The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News