What's Happening?
Cisco's Talos security researchers have identified a large-scale credential harvesting campaign exploiting a critical vulnerability in Next.js applications, known as React2Shell. The vulnerability, tracked as CVE-2025-55182, allows remote attackers to
execute arbitrary code. The threat actor, identified as UAT-10608, uses automated scanning to find vulnerable applications and then deploys scripts to harvest credentials, cloud tokens, and other sensitive data. Over 766 systems have been compromised, with more than 10,000 files exfiltrated. The attackers use the Nexus Listener framework to manage the stolen data, which includes keys for AI platforms, AWS credentials, and more.
Why It's Important?
This campaign highlights the significant risks posed by unpatched vulnerabilities in widely used web applications. The exploitation of React2Shell demonstrates how attackers can leverage automated tools to conduct large-scale attacks, compromising sensitive data across numerous organizations. The stolen credentials can lead to further security breaches, including supply chain attacks and unauthorized access to critical systems. This incident underscores the importance of timely vulnerability management and the need for organizations to regularly update and secure their software environments to prevent such exploits.
What's Next?
Organizations affected by this campaign are advised to rotate all exposed credentials and implement stronger security measures to prevent future breaches. This includes regular vulnerability assessments, patch management, and the use of advanced threat detection tools. As attackers continue to exploit known vulnerabilities, there is a pressing need for improved security practices and awareness among developers and IT teams. The cybersecurity community is likely to focus on developing more robust defenses against similar attacks, emphasizing the importance of proactive security measures.









