Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Operation PCPcat Hacked 59,000+ Next.js/React Servers Within 48 Hours

Posted on December 24, 2025December 24, 2025 By CWS

An enormous credential-theft marketing campaign dubbed PCPcat compromised 59,128 Subsequent.js servers in underneath 48 hours. The operation exploits crucial vulnerabilities CVE-2025-29927 and CVE-2025-66478, attaining a 64.6% success fee throughout 91,505 scanned targets.

PCPCat scanners, distributed by way of react.py malware, probe public Subsequent.js deployments for distant code execution flaws. Attackers use prototype air pollution in JSON payloads to inject instructions by way of child_process.execSync(), confirming RCE with an ‘id’ check earlier than extracting credentials from .env recordsdata, SSH keys, AWS configs, Docker tokens, Git credentials, and bash historical past.

Based on Mario Candela’s evaluation, the compromised hosts then obtain proxy.sh from 67.217.57.240:666, putting in GOST SOCKS5 proxy, FRP reverse tunnels, and protracted systemd providers like pcpcat-gost.service.

C2 Infrastructure Uncovered

The command-and-control server at 67.217.57.240:5656 runs an unauthenticated API, publicly leaking stats by way of GET /stats: 91,505 IPs scanned, 59,128 successes, batch dimension of two,000 random IPs.

Nodes fetch targets by way of GET /domains?consumer=, exfiltrate knowledge by means of POST /outcome (as much as 2MB JSON payloads), and examine well being at /well being. Candela’s honeypot reconnaissance confirmed knowledge ingestion, with FRP tunneling on port 888 enabling pivoting.

EndpointPurposeStatus/domains?consumer=Goal assignmentActive/resultCredential exfiltrationAccepts knowledge/statsCampaign metricsExposes 59K compromises/healthServer checkResponsive

Key IoCs embody C2 IPs (67.217.57.240 ports 666/888/5656), recordsdata (/choose/pcpcat/*, ~/.pcpcat_installed), processes (gost -L socks5://:1080, frpc), and logs (“UwU PCP Cat was right here~”, t.me/Persy_PCP). Honeypots captured Docker API abuse on port 2375 for containerized persistence.

Detection guidelines cowl Suricata alerts for /outcome POSTs with “env” payloads and YARA for react.py strings like “CVE-2025-29927” and “PCPcat”.

Attributed to “PCP Cat” by way of Telegram channels t.me/teampcp, the marketing campaign maps to MITRE ATT&CK strategies like T1190 (public app exploit) and T1552 (unsecured credentials).

Projections estimate 41,000 each day compromises, ensuing within the harvesting of 300K+ credentials for cloud takeovers or resale. Subsequent.js customers should patch urgently, block C2 domains, rotate keys, and monitor for systemd anomalies.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Hacked, Hours, Next.jsReact, Operation, PCPcat, Servers

Post navigation

Previous Post: Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026
Next Post: Interpol Taken Down 6 Ransomware Variants and Arrested 500+ Suspects

Related Posts

DarkCloud Stealer Employs New Infection Chain and ConfuserEx-Based Obfuscation Cyber Security News
LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments Cyber Security News
Cognizant Hit With Multiple US Class-Action Lawsuits Following TriZetto Data Breach Cyber Security News
Hackers Attacking Remote Desktop Protocol Services from 100,000+ IP Addresses Cyber Security News
Apache NuttX Vulnerability Let Attackers to Crash Systems Cyber Security News
Lenovo Vantage Vulnerabilities Allow Attackers to Escalate Privileges as SYSTEM User Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark