Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

0
Medium
Exploitweb
Published: Thu Feb 05 2026 (02/05/2026, 04:56:00 UTC)
Source: The Hacker News

Description

Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and management panels like Baota (BT) in an attempt to route it through the attacker's infrastructure. Datadog Security Labs said it observed threat actors associated with the recent React2Shell (CVE-2025-55182, CVSS score: 10.0) exploitation using malicious NGINX

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/05/2026, 09:11:21 UTC

Technical Analysis

This threat involves an active campaign exploiting the React2Shell vulnerability (CVE-2025-55182, CVSS 10.0) to inject malicious configurations into NGINX web servers and Baota (BT) management panels. Attackers use a multi-stage shell script toolkit to gain persistence and redirect legitimate web traffic through attacker-controlled backend servers via the NGINX "proxy_pass" directive. The toolkit includes zx.sh (orchestrator), bt.sh (targets Baota panel), 4zdh.sh (enumerates NGINX config locations), zdh.sh (targets Linux/containerized NGINX and specific TLDs), and ok.sh (generates reports on hijacking rules). The campaign primarily targets Asian TLDs (.in, .id, .pe, .bd, .th), Chinese hosting infrastructure, and government/educational TLDs (.edu, .gov), enabling attackers to intercept and manipulate web traffic. Observed post-exploitation payloads include cryptomining binaries and reverse shells, indicating both automated resource extraction and interactive access attempts. The campaign is linked to a broader reconnaissance effort targeting Citrix ADC and Netscaler gateways using residential proxies and cloud IPs to discover vulnerable login panels. The attack leverages legitimate utilities (curl, wget) or raw TCP connections for payload delivery, complicating detection. Despite no direct CVSS for the NGINX config injection, the underlying React2Shell vulnerability is critical, and the combined exploitation allows significant compromise of web infrastructure.

Potential Impact

For European organizations, this threat poses substantial risks to confidentiality and integrity by enabling attackers to intercept, manipulate, or redirect web traffic. Organizations running NGINX servers, especially those using Baota panels or hosting government and educational domains, could experience data leakage, session hijacking, or unauthorized access. The redirection of traffic through attacker-controlled servers may facilitate credential theft, malware distribution, or espionage. The presence of cryptomining payloads also indicates potential resource abuse, leading to degraded system performance and increased operational costs. The campaign's targeting of specific TLDs and hosting infrastructures suggests potential spillover into European entities with business or academic ties to Asia or those using similar infrastructure. Additionally, the use of reverse shells implies attackers may gain persistent interactive access, enabling lateral movement and further compromise within networks. The threat complicates incident response due to the use of legitimate tools and configuration files, increasing the risk of prolonged undetected presence.

Mitigation Recommendations

European organizations should conduct immediate audits of all NGINX configurations, focusing on unauthorized or suspicious 'proxy_pass' directives and unusual location blocks. Patch all systems to remediate the React2Shell vulnerability (CVE-2025-55182) promptly. Restrict access to management panels like Baota (BT) through network segmentation, strong authentication, and IP whitelisting. Implement file integrity monitoring on NGINX configuration directories to detect unauthorized changes. Employ enhanced logging and monitoring to identify anomalous traffic redirection or unexpected outbound connections from web servers. Use endpoint detection and response (EDR) tools to detect and block execution of suspicious shell scripts and post-exploitation payloads. Limit the use of curl, wget, and similar utilities on production servers or monitor their usage closely. Establish incident response playbooks specific to web traffic hijacking and conduct regular penetration testing to identify configuration weaknesses. Collaborate with threat intelligence providers to stay updated on indicators of compromise related to this campaign.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/hackers-exploit-react2shell-to-hijack.html","fetched":true,"fetchedAt":"2026-02-05T09:10:52.360Z","wordCount":1083}

Threat ID: 69845e9ff9fa50a62f0ff3a9

Added to database: 2/5/2026, 9:10:55 AM

Last enriched: 2/5/2026, 9:11:21 AM

Last updated: 3/22/2026, 1:40:58 AM

Views: 255

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses