Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Operation PCPcat Hacked 59,000+ Next.js/React Servers Within 48 Hours

Operation PCPcat Hacked 59,000+ Next.js/React Servers Within 48 Hours

Posted on December 24, 2025December 24, 2025 By CWS

An enormous credential-theft marketing campaign dubbed PCPcat compromised 59,128 Subsequent.js servers in underneath 48 hours. The operation exploits crucial vulnerabilities CVE-2025-29927 and CVE-2025-66478, attaining a 64.6% success fee throughout 91,505 scanned targets.

PCPCat scanners, distributed by way of react.py malware, probe public Subsequent.js deployments for distant code execution flaws. Attackers use prototype air pollution in JSON payloads to inject instructions by way of child_process.execSync(), confirming RCE with an ‘id’ check earlier than extracting credentials from .env recordsdata, SSH keys, AWS configs, Docker tokens, Git credentials, and bash historical past.

Based on Mario Candela’s evaluation, the compromised hosts then obtain proxy.sh from 67.217.57.240:666, putting in GOST SOCKS5 proxy, FRP reverse tunnels, and protracted systemd providers like pcpcat-gost.service.

C2 Infrastructure Uncovered

The command-and-control server at 67.217.57.240:5656 runs an unauthenticated API, publicly leaking stats by way of GET /stats: 91,505 IPs scanned, 59,128 successes, batch dimension of two,000 random IPs.

Nodes fetch targets by way of GET /domains?consumer=, exfiltrate knowledge by means of POST /outcome (as much as 2MB JSON payloads), and examine well being at /well being. Candela’s honeypot reconnaissance confirmed knowledge ingestion, with FRP tunneling on port 888 enabling pivoting.

EndpointPurposeStatus/domains?consumer=Goal assignmentActive/resultCredential exfiltrationAccepts knowledge/statsCampaign metricsExposes 59K compromises/healthServer checkResponsive

Key IoCs embody C2 IPs (67.217.57.240 ports 666/888/5656), recordsdata (/choose/pcpcat/*, ~/.pcpcat_installed), processes (gost -L socks5://:1080, frpc), and logs (“UwU PCP Cat was right here~”, t.me/Persy_PCP). Honeypots captured Docker API abuse on port 2375 for containerized persistence.

Detection guidelines cowl Suricata alerts for /outcome POSTs with “env” payloads and YARA for react.py strings like “CVE-2025-29927” and “PCPcat”.

Attributed to “PCP Cat” by way of Telegram channels t.me/teampcp, the marketing campaign maps to MITRE ATT&CK strategies like T1190 (public app exploit) and T1552 (unsecured credentials).

Projections estimate 41,000 each day compromises, ensuing within the harvesting of 300K+ credentials for cloud takeovers or resale. Subsequent.js customers should patch urgently, block C2 domains, rotate keys, and monitor for systemd anomalies.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Hacked, Hours, Next.jsReact, Operation, PCPcat, Servers

Post navigation

Previous Post: Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026
Next Post: Interpol Taken Down 6 Ransomware Variants and Arrested 500+ Suspects

Related Posts

Google Gemini for Workspace Vulnerability Lets Attackers Hide Malicious Scripts in Emails Google Gemini for Workspace Vulnerability Lets Attackers Hide Malicious Scripts in Emails Cyber Security News
Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers Cyber Security News
Capita To pay £14 Million For Data Breach Exposes 6.6 Million Users Personal Data Capita To pay £14 Million For Data Breach Exposes 6.6 Million Users Personal Data Cyber Security News
New Cyberattack Leverages NPM Ecosystem to Infect Developers While Installing Packages New Cyberattack Leverages NPM Ecosystem to Infect Developers While Installing Packages Cyber Security News
Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload Cyber Security News
New Operation SkyCloak Uses Powershell Tools and Hidden SSH Service to Unblock Traffic New Operation SkyCloak Uses Powershell Tools and Hidden SSH Service to Unblock Traffic Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News