Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NGINX Vulnerability Exploited in Web Traffic Hijacking

NGINX Vulnerability Exploited in Web Traffic Hijacking

Posted on February 5, 2026 By CWS

Recent findings by cybersecurity experts have unveiled a significant web traffic hijacking campaign exploiting NGINX installations and management interfaces like Baota. The campaign aims to reroute web traffic through servers controlled by the attackers, posing a substantial threat to internet security.

React2Shell Exploitation

Datadog Security Labs identified that the perpetrators of this campaign are leveraging the React2Shell (CVE-2025-55182) vulnerability with a critical CVSS score of 10.0. The attackers utilize malicious NGINX configurations to intercept legitimate web requests, diverting them through their own backend systems.

Security researcher Ryan Simon highlighted that the campaign targets specific top-level domains (TLDs) such as .in, .id, .pe, .bd, and .th, alongside Chinese hosting services like the Baota Panel, as well as government and educational domains (.edu, .gov).

Malicious NGINX Configurations

The attackers employ shell scripts to embed harmful configurations within NGINX, an open-source tool used for web traffic management. These configurations manipulate incoming requests on designated URL paths, redirecting them to attacker-operated domains using the “proxy_pass” command.

The toolkit includes several scripts designed to maintain persistence and generate malicious NGINX configurations. Key components include zx.sh, bt.sh, 4zdh.sh, zdh.sh, and ok.sh, each with specific functions ranging from orchestrating attacks to modifying NGINX settings and reporting active hijacking rules.

Emerging Threats and Analysis

GreyNoise’s analysis revealed two dominant IP addresses—193.142.147[.]209 and 87.121.84[.]24—responsible for over half of the exploitation attempts following the public disclosure of React2Shell. Between January 26 and February 2, 2026, 1,083 unique IP addresses were implicated in these attacks.

These sources deploy varied post-exploitation tactics, including cryptomining binary retrieval and direct reverse shell access, indicating a preference for interactive engagement over automated processes. Moreover, the campaign coincides with a broader reconnaissance effort against Citrix ADC Gateway and Netscaler Gateway infrastructures, employing extensive residential proxies and a Microsoft Azure IP address for login panel discovery.

The operation features two distinct phases: a widespread proxy-based login discovery and an AWS-hosted version enumeration sprint, suggesting a coordinated reconnaissance strategy.

This revelation underscores the critical need for robust security measures to safeguard web servers and prevent unauthorized access, emphasizing the importance of staying updated on emerging threats and vulnerabilities.

The Hacker News Tags:Baota Panel, Cybersecurity, Datadog Security Labs, malicious configurations, NGINX, React2Shell, shell scripts, traffic hijacking, Vulnerability, web security

Post navigation

Previous Post: New Malvertising Threat Exploits Facebook Ads for Scams
Next Post: DNS TXT Records Exploited in Advanced Cyber Attacks

Related Posts

Shield Your SaaS from Bot Threats with SafeLine WAF Shield Your SaaS from Bot Threats with SafeLine WAF The Hacker News
Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation The Hacker News
MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted The Hacker News
ClickFix Campaigns Exploit Fake AI Tools to Spread MacSync ClickFix Campaigns Exploit Fake AI Tools to Spread MacSync The Hacker News
Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time The Hacker News
VPN 0-Day, Encryption Backdoor, AI Malware, macOS Flaw, ATM Hack & More VPN 0-Day, Encryption Backdoor, AI Malware, macOS Flaw, ATM Hack & More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark