Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit React2Shell Vulnerability in Next.js Servers

Hackers Exploit React2Shell Vulnerability in Next.js Servers

Posted on April 3, 2026 By CWS

In a recent large-scale cyberattack, over 700 web servers running Next.js have been compromised. This surge in attacks has been linked to a hacker group known as UAT-10608, according to cybersecurity experts at Cisco Talos. The attackers have been exploiting a significant security vulnerability called React2Shell, targeting web applications worldwide.

Exploiting React2Shell for Remote Code Execution

The React2Shell vulnerability, identified as CVE-2025-55182, is a critical remote code execution flaw in React Server Components. Attackers leverage this flaw to send crafted web requests to vulnerable servers, leading to unauthorized execution of hidden commands due to inadequate data validation by the server. Worryingly, this attack does not require passwords or user interaction, making it particularly dangerous.

The hacker group employs automated tools to identify and exploit susceptible Next.js servers. Upon finding a target, they deploy the React2Shell exploit to gain unauthorized access, followed by the installation of a malicious script.

Mass Credential Theft and NEXUS Listener

This malicious script operates silently, scanning server files, cloud configurations, and system memory to extract sensitive credentials. These include cloud tokens, database passwords, and more, which are then transmitted to the attackers’ command-and-control server.

To manage the extensive volume of stolen data, the hackers utilize a specialized web dashboard named ‘NEXUS Listener’. Cisco Talos researchers discovered that this tool documented 766 compromised hosts within just a day. The data revealed that over 90% of these hosts had their database credentials pilfered, and nearly 80% lost crucial SSH keys.

Implications and Urgent Response

The ramifications of these breaches are severe. With stolen credentials, attackers can access private user data, financial records, and even take control of entire cloud environments. The compromised SSH keys enable lateral movement across different servers, while stolen GitHub tokens pose a risk of malicious code insertion into software updates.

Organizations using Next.js must act swiftly to mitigate these risks. Immediate patching of the React2Shell vulnerability is crucial. Additionally, companies should change all passwords, API keys, and security tokens if they suspect being targeted. Restricting access to cloud metadata services and monitoring for unusual server activities are also recommended actions.

Stay informed on the latest cybersecurity developments by following us on Google News, LinkedIn, and X. Contact us to share your cybersecurity stories.

Cyber Security News Tags:Cisco Talos, cloud security, credential theft, CVE-2025-55182, Cybersecurity, Next.js, NEXUS Listener, React2Shell, remote code execution, SSH keys, UAT-10608

Post navigation

Previous Post: ShareFile Flaws Enable Unauthenticated Remote Code Execution
Next Post: React2Shell Exploitation: Large-Scale Attack Exposes Credentials

Related Posts

North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging Cyber Security News
GhostSocks Malware Transforms Devices into Proxy Nodes GhostSocks Malware Transforms Devices into Proxy Nodes Cyber Security News
Microsoft Investigates Defender Portal Access Issues Following Traffic Spike Microsoft Investigates Defender Portal Access Issues Following Traffic Spike Cyber Security News
Fortinet FortiWeb Fabric Connector Vulnerability Exploited to Execute Remote Code Fortinet FortiWeb Fabric Connector Vulnerability Exploited to Execute Remote Code Cyber Security News
NVIDIA VApp for Windows Vulnerability Let Attackers Execute Malicious Code NVIDIA VApp for Windows Vulnerability Let Attackers Execute Malicious Code Cyber Security News
1inch partners with Innerworks to strengthen DeFi security through AI-Powered threat detection 1inch partners with Innerworks to strengthen DeFi security through AI-Powered threat detection Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked TA416 Intensifies Cyber Attacks on Europe
  • Urgent Security Alert: Thousands of F5 BIG-IP Devices at Risk
  • Microsoft Reveals Cookie-Based PHP Web Shell Threats
  • Social Engineering Attack Compromises Popular Axios Library
  • North Korean Hackers Steal $285M from DeFi Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked TA416 Intensifies Cyber Attacks on Europe
  • Urgent Security Alert: Thousands of F5 BIG-IP Devices at Risk
  • Microsoft Reveals Cookie-Based PHP Web Shell Threats
  • Social Engineering Attack Compromises Popular Axios Library
  • North Korean Hackers Steal $285M from DeFi Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark