Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hackers exploit CVE-2025-55182 to compromise 766 Next.js hosts and steal credentials

Cisco Patch 9.8 CVSS IMC and SSM flaws allow remote systems to be compromised

United Airlines mobile app now displays TSA wait times for select airports

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers exploit CVE-2025-55182 to compromise 766 Next.js hosts and steal credentials
Identity

Hackers exploit CVE-2025-55182 to compromise 766 Next.js hosts and steal credentials

By April 2, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananApril 2, 2026Vulnerability/Threat Intelligence

We have observed large-scale credential harvesting operations exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web Services (AWS) secrets, shell command history, Stripe API keys, and GitHub tokens at scale.

Cisco Talos attributes this operation to the threat cluster we track as UAT-10608. At least 766 hosts across multiple geographic regions and cloud providers were compromised as part of this activity.

“After compromise, UAT-10608 leverages automated scripts to extract and steal credentials from various applications, which are then sent to command and control (C2),” security researchers Asheer Malhotra and Brandon White wrote in a report shared with The Hacker News ahead of publication.

“C2 hosts a web-based graphical user interface (GUI) titled ‘NEXUS Listener’ that allows you to view stolen information and gain analytical insights using pre-compiled statistics about collected credentials and compromised hosts.”

This campaign has been assessed to target Next.js applications vulnerable to CVE-2025-55182 (CVSS score: 10.0). CVE-2025-55182 (CVSS score: 10.0) is a critical flaw in React Server Components and Next.js App Router that could lead to remote code execution on initial access and subsequent removal of the NEXUS Listener collection framework.

This is accomplished through a dropper that initiates the deployment of a multi-phase collection script that collects various details from the compromised system.

Environment variables JSON parsing environment from the JS runtime SSH private keys and authorized_keys Shell command history Kubernetes service account tokens Docker container configuration (running containers, their images, public ports, network configuration, mount points, environment variables) API keys AWS, Google Cloud, and Microsoft Azure instances Metadata Temporary credentials associated with IAM roles by querying the service Running processes

The cybersecurity firm says the breadth of its victims and indiscriminate targeting pattern is consistent with automated scanning, likely leveraging services such as Shodan, Censys, or custom scanners to identify publicly accessible Next.js deployments and investigate their vulnerabilities.

At the heart of this framework is a password-protected web application. This makes all stolen data available to operators through a graphical user interface with search capabilities to sift through the information.

“The application includes a list of several statistics, including the number of compromised hosts and the total number of each credential type successfully extracted from those hosts,” Talos said. “This web application allows users to see all compromised hosts. It also lists uptime for the application itself.”

The current version of NEXUS Listener is V3, indicating that the tool has gone through quite a few development iterations to reach its current stage.

Talos says it was able to retrieve data from unauthenticated NEXUS Listener instances, which included API keys related to Stripe, artificial intelligence platforms (OpenAI, Anthropic, NVIDIA NIM), and communications services (SendGrid and Brevo), as well as Telegram bot tokens, webhook secrets, GitHub and GitLab tokens, database connection strings, and other application secrets.

Large-scale data collection efforts highlight how attackers can use access to compromised hosts as a weapon to launch follow-up attacks. We recommend that organizations audit their environments to enforce the principle of least privilege, enable secret scanning, avoid reusing SSH key pairs, implement IMDSv2 enforcement on all AWS EC2 instances, and rotate credentials if a compromise is suspected.

“Beyond the immediate operational value of individual credentials, it represents a detailed map of a victim organization’s infrastructure, including what services it runs, how it is configured, what cloud providers it uses, and what third-party integrations it has in place,” the researchers said.

“This intelligence provides significant value for creating targeted follow-on attacks, social engineering campaigns, or selling access to other threat actors.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCisco Patch 9.8 CVSS IMC and SSM flaws allow remote systems to be compromised

Related Posts

Cisco Patch 9.8 CVSS IMC and SSM flaws allow remote systems to be compromised

April 2, 2026

Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

April 2, 2026

Researchers reveal mining operations using ISO lures to spread RATs and crypto miners

April 2, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hackers exploit CVE-2025-55182 to compromise 766 Next.js hosts and steal credentials

Cisco Patch 9.8 CVSS IMC and SSM flaws allow remote systems to be compromised

United Airlines mobile app now displays TSA wait times for select airports

Tesla’s low-priced cars aren’t contributing to sales decline

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.