CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 06, 2026

Automated Credential Harvesting Campaign Exploits React2Shell Flaw

Dark Reading Archived Apr 06, 2026 ✓ Full text saved

An emerging threat cluster tracked as UAT-10608 is exploiting vulnerable Web-exposed Next.js apps and using an automated tool to exfiltrate credentials, secrets, and other system data.

Full text archived locally
✦ AI Summary · Claude Sonnet


    CYBERATTACKS & DATA BREACHES THREAT INTELLIGENCE VULNERABILITIES & THREATS IDENTITY & ACCESS MANAGEMENT SECURITY NEWS Automated Credential Harvesting Campaign Exploits React2Shell Flaw An emerging threat cluster tracked as UAT-10608 is exploiting vulnerable Web-exposed Next.js apps and using an automated tool to exfiltrate credentials, secrets, and other system data. Elizabeth Montalbano,Contributing Writer April 6, 2026 3 Min Read SOURCE: VICTOR KOLDUNOV VIA ALAMY STOCK PHOTO A global cross-industry credential theft campaign is exploiting public-facing Web applications vulnerable to React2Shell and then deploying an automated collection tool to steal credentials and other valuable system data for further malicious activity.  Researchers at Cisco Talos discovered the campaign, which they attribute to a threat cluster tracked as UAT-10608 and that uses an automated credential-harvesting framework dubbed "NEXUS Listener," according to a report published last week. "The systematic exploitation and exfiltration campaign has resulted in the compromise of at least 766 hosts, as of time of writing, across multiple geographic regions and cloud providers," Cisco analysts Asheer Malhotra and Brandon White wrote in the post. Attackers target Next.js Web applications vulnerable to CVE-2025-55182 — a pre-authentication remote code execution (RCE) flaw better known as React2Shell that initially was discovered and subsequently widely exploited late last year — to gain initial access to victims' networks. React2Shell affects React Server Components (RSCs) and, if exploited, allows affected endpoints to deserialize payloads from inbound HTTP requests without adequate validation or sanitization.  Related:Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate After successful compromise, attackers then deploy NEXUS Listener to steal credentials, SSH keys, cloud tokens, and environment secrets at scale from a system. They can then access this data in the tool's graphical user interface (GUI) that includes in-depth statistics and search capabilities to allow them to sift through it at will.  Partially Automated Attack Sequence Loading... The campaign, which spans various industries and geographies, appears to be the work of skilled threat actors who use automation tools and services at their disposal to identify vulnerable systems and cast the widest attack net possible, the researchers observed. "The breadth of the victim set and the indiscriminate targeting pattern is consistent with automated scanning — likely based on host profile data from services like Shodan, Censys, or custom scanners to enumerate publicly reachable Next.js deployments and probe them for the described React configuration vulnerabilities," they wrote. Attackers only engage in the initial part of the attack before letting NEXUS Listener take over. The attack begins with identification of a publicly accessible Web app using a vulnerable version of RSCs or a framework built on top of it, such as Next.js.  Attackers then craft a malicious serialized payload for React2Shell exploitation and use an HTTP request that's sent directly to a Server Function endpoint to send the payload, which requires no authentication, they said. "The server deserializes the malicious payload, resulting in arbitrary code execution in the server-side Node.js process," the researchers wrote. Related:Bank Trojan 'Casbaneiro' Worms Through Latin America Powerful Automation Tool Once attackers identify a vulnerable endpoint, there is no further manual interaction, with NEXUS Listener taking over to extract and exfiltrate credentials harvested from the system. The framework acts as both a command-and-control (C2) platform and an analytics dashboard.  "This structured data collection significantly enhances the operational value of the breach, effectively turning stolen credentials into a searchable intelligence dataset," the researchers wrote. The automated tool's enhanced capabilities give attackers a range of malicious options for follow-up attack activity in which they can engage due to their opportunity to view a detailed map of victim infrastructure — including services, cloud usage, and integrations. These options include further attacks, social engineering campaigns, and sale of access to other threat actors, according to the researchers. Defense Recommendations Defending against UAT-10608's credential theft campaign begins with patching CVE-2025-55182 in all Next.js deployments, which, considering that attacks continue, still hasn't been done by many affected organizations. Related:AI-Powered 'DeepLoad' Malware Steals Credentials, Evades Detection Defenders also should rotate all potentially exposed credentials and API keys, enforce least-privilege access, and avoid SSH key reuse to mitigate malicious activities like the ones conducted by the threat cluster, the researchers said. They also should restrict access to cloud metadata services, implement secrets scanning, and monitor for anomalous activity to avoid compromise. Security teams also can investigate for specific artifacts of a UAT-10608 attack on Web application hosts, including the following: unexpected processes spawned from /tmp/ with randomized dot-prefixed names, nohup invocations in process listings not associated with known application workflows, unusual outbound HTTP/S connections from application containers to non-production endpoints, and evidence of __NEXT_DATA__ containing server-side secrets in rendered HTML, according to Cisco Talos. About the Author Elizabeth Montalbano Contributing Writer Elizabeth Montalbano is a freelance writer, journalist, and therapeutic writing mentor with more than 25 years of professional experience. Her areas of expertise include technology, business, and culture. Elizabeth previously lived and worked as a full-time journalist in Phoenix, San Francisco, and New York City; she currently resides in a village on the southwest coast of Portugal. In her free time, she enjoys surfing, hiking with her dogs, traveling, playing music, yoga, and cooking. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports AI SOC for MDR: The Structural Evolution of Managed Detection and Response Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Gartner IGA Voice of the Customer 2026 Cybersecurity Forecast 2026 Access More Research Webinars From Alerts to Outcomes: How Enterprise SOCs Measure What Matters Identity Maturity Under Pressure: 2026 Findings and How to Catch Up Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need More Webinars You May Also Like CYBERATTACKS & DATA BREACHES Cyberattackers Target LastPass, Top Password Managers by Nate Nelson, Contributing Writer OCT 16, 2025 CYBERATTACKS & DATA BREACHES After Pahalgam Attack, Hacktivists Unite Under #OpIndia by Nate Nelson, Contributing Writer MAY 09, 2025 CYBERATTACKS & DATA BREACHES Despite Arrests, Scattered Spider Continues High-Profile Hacking by Rob Wright MAY 02, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 Editor's Choice CYBERSECURITY OPERATIONS RSAC 2026: AI Dominates, But Community Remains Key to Security byKristina Beek,Rob Wright APR 2, 2026 CYBERATTACKS & DATA BREACHES Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate byNate Nelson APR 2, 2026 3 MIN READ ENDPOINT SECURITY CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry byJeffrey Schwartz APR 3, 2026 3 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Identity Maturity Under Pressure: 2026 Findings and How to Catch Up WED, MAY 6,2026 AT 1PM EST Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST Retail Security: Protecting Customer Data and Payment Systems THURS, APRIL 2, 2026 AT 1PM EST Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need WED, APRIL 1, 2026 AT 1PM EST Securing Remote and Hybrid Work Forecast: Beyond the VPN TUES, MARCH 10, 2026 AT 1PM EST More Webinars White Papers How Sunrun Transformed Security Operations with AiStrike Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity Explore More White Papers BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE Experience cutting-edge cybersecurity insights in this four-day event featuring expert Briefings on the latest research, Arsenal tool demos, a vibrant Business Hall, networking opportunities, and more. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass. GET YOUR PASS GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Apr 06, 2026
    Archived
    Apr 06, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗