Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Malicious NGINX configuration enables massive web traffic hijacking campaign

Sam Altman took a very harsh stance on Claude’s Super Bowl ad

Alphabet won’t tell investors about Google and Apple’s AI deal

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious NGINX configuration enables massive web traffic hijacking campaign
Identity

Malicious NGINX configuration enables massive web traffic hijacking campaign

userBy userFebruary 5, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rabi LakshmananFebruary 5, 2026Web security/vulnerabilities

Cybersecurity researchers have detailed an active web traffic hijacking campaign that targets NGINX installations and administrative panels such as Baota (BT) in an attempt to route them through attackers’ infrastructure.

Datadog Security Labs said it has observed threat actors associated with recent React2Shell (CVE-2025-55182, CVSS score: 10.0) exploits using malicious NGINX configurations to conduct attacks.

“The malicious configuration intercepts legitimate web traffic between users and websites and routes it through backend servers controlled by the attacker,” security researcher Ryan Simon said. “This campaign targets Asian TLDs (.in, .id, .pe, .bd, .th), Chinese hosting infrastructure (Baota panel), and government and education TLDs (.edu, .gov).”

This activity involves using shell scripts to inject malicious configurations into NGINX, an open-source reverse proxy and load balancer for web traffic management. These “location” settings are designed to capture incoming requests at specific predefined URL paths and redirect them to domains under the attacker’s control via the “proxy_pass” directive.

These scripts are part of a multi-stage toolkit that facilitates the persistence and creation of malicious configuration files that include malicious directives to redirect web traffic. The toolkit components are:

zx.sh acts as an orchestrator that executes subsequent stages through regular utilities such as curl and wget. If the two programs are blocked, they create raw TCP connections and send HTTP requests. bt.sh targets the Baota (BT) admin panel environment and overwrites the NGINX configuration file. 4zdh.sh enumerates common Nginx configuration locations and takes steps to minimize errors when creating new configurations. zdh.sh takes a narrower targeting approach, targeting top-level domains, primarily focused on Linux or containerized NGINX configurations. (TLD) such as .in and .id ok.sh. Generate a report detailing all active NGINX traffic hijacking rules.

“The toolkit contains several scripts designed for target detection and persistence and creation of malicious configuration files containing directives intended to redirect web traffic.

This disclosure was made as GreyNoise mentioned two IP addresses – 193.142.147.[.]209 and 87.121.84[.]24 – React2Shell accounts for 56% of all exploitation attempts observed two months after its release. From January 26, 2026 to February 2, 2026, a total of 1,083 unique source IP addresses were involved in React2Shell exploitation.

“The primary sources deploy separate post-exploitation payloads: one retrieves the cryptomining binary from a staging server, and the other opens a reverse shell directly to the scanner IP,” the threat intelligence firm said. “This approach suggests an interest in interactive access rather than automated resource extraction.”

This also follows the discovery of a coordinated reconnaissance campaign targeting Citrix ADC Gateway and Netscaler Gateway infrastructure using tens of thousands of residential proxies and a single Microsoft Azure IP address (“52.139.3”).[.]76″) to find the login panel.

“This campaign ran two different modes: a large-scale distributed login panel discovery operation with rotation of residential proxies, and an intensive version disclosure sprint hosted on AWS,” GreyNoise said. “They have complementary purposes of both login panel discovery and version enumeration, which suggests coordinated reconnaissance.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSam Altman took a very harsh stance on Claude’s Super Bowl ad
user
  • Website

Related Posts

Microsoft develops scanner to detect backdoors in open weight large-scale language models

February 4, 2026

DEAD#VAX malware campaign deploys AsyncRAT via VHD phishing files hosted on IPFS

February 4, 2026

China-linked Amaranth-Dragon exploits WinRAR flaws for espionage

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Malicious NGINX configuration enables massive web traffic hijacking campaign

Sam Altman took a very harsh stance on Claude’s Super Bowl ad

Alphabet won’t tell investors about Google and Apple’s AI deal

Police station set up in Elon Musk’s SpaceX town

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.