Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NGINX Vulnerability Exploited in Web Traffic Hijacking

NGINX Vulnerability Exploited in Web Traffic Hijacking

Posted on February 5, 2026 By CWS

Recent findings by cybersecurity experts have unveiled a significant web traffic hijacking campaign exploiting NGINX installations and management interfaces like Baota. The campaign aims to reroute web traffic through servers controlled by the attackers, posing a substantial threat to internet security.

React2Shell Exploitation

Datadog Security Labs identified that the perpetrators of this campaign are leveraging the React2Shell (CVE-2025-55182) vulnerability with a critical CVSS score of 10.0. The attackers utilize malicious NGINX configurations to intercept legitimate web requests, diverting them through their own backend systems.

Security researcher Ryan Simon highlighted that the campaign targets specific top-level domains (TLDs) such as .in, .id, .pe, .bd, and .th, alongside Chinese hosting services like the Baota Panel, as well as government and educational domains (.edu, .gov).

Malicious NGINX Configurations

The attackers employ shell scripts to embed harmful configurations within NGINX, an open-source tool used for web traffic management. These configurations manipulate incoming requests on designated URL paths, redirecting them to attacker-operated domains using the “proxy_pass” command.

The toolkit includes several scripts designed to maintain persistence and generate malicious NGINX configurations. Key components include zx.sh, bt.sh, 4zdh.sh, zdh.sh, and ok.sh, each with specific functions ranging from orchestrating attacks to modifying NGINX settings and reporting active hijacking rules.

Emerging Threats and Analysis

GreyNoise’s analysis revealed two dominant IP addresses—193.142.147[.]209 and 87.121.84[.]24—responsible for over half of the exploitation attempts following the public disclosure of React2Shell. Between January 26 and February 2, 2026, 1,083 unique IP addresses were implicated in these attacks.

These sources deploy varied post-exploitation tactics, including cryptomining binary retrieval and direct reverse shell access, indicating a preference for interactive engagement over automated processes. Moreover, the campaign coincides with a broader reconnaissance effort against Citrix ADC Gateway and Netscaler Gateway infrastructures, employing extensive residential proxies and a Microsoft Azure IP address for login panel discovery.

The operation features two distinct phases: a widespread proxy-based login discovery and an AWS-hosted version enumeration sprint, suggesting a coordinated reconnaissance strategy.

This revelation underscores the critical need for robust security measures to safeguard web servers and prevent unauthorized access, emphasizing the importance of staying updated on emerging threats and vulnerabilities.

The Hacker News Tags:Baota Panel, Cybersecurity, Datadog Security Labs, malicious configurations, NGINX, React2Shell, shell scripts, traffic hijacking, Vulnerability, web security

Post navigation

Previous Post: New Malvertising Threat Exploits Facebook Ads for Scams
Next Post: DNS TXT Records Exploited in Advanced Cyber Attacks

Related Posts

Enhancing Security with Ceros for Claude Code Enhancing Security with Ceros for Claude Code The Hacker News
A 24-Hour Timeline of a Modern Stealer Campaign A 24-Hour Timeline of a Modern Stealer Campaign The Hacker News
27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials The Hacker News
Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware The Hacker News
SEC Files Charges Over  Million Crypto Scam Using Fake AI-Themed Investment Tips SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips The Hacker News
VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark