CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

React2Shell Exploit Used to Hijack Web Traffic via NGINX Configurations

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Threat actors are exploiting the React2Shell vulnerability (CVE-2025-55182) in NGINX servers to hijack web traffic. The campaign targets Asian TLDs, Chinese hosting infrastructure, and government/educational domains. Malicious NGINX configurations redirect traffic through attacker-controlled servers. The attack involves a multi-stage toolkit with scripts for persistence and traffic redirection. Two IP addresses account for 56% of exploitation attempts, with distinct post-exploitation payloads observed. Additionally, a coordinated reconnaissance campaign targeting Citrix ADC Gateway and Netscaler Gateway infrastructure was discovered, using residential proxies and an Azure IP address.

Timeline

  1. 05.02.2026 06:56 1 articles · 18h ago

    React2Shell Exploit Used to Hijack Web Traffic via NGINX Configurations

    Threat actors are exploiting the React2Shell vulnerability (CVE-2025-55182) in NGINX servers to hijack web traffic. The campaign targets Asian TLDs, Chinese hosting infrastructure, and government/educational domains. Malicious NGINX configurations redirect traffic through attacker-controlled servers. The attack involves a multi-stage toolkit with scripts for persistence and traffic redirection. Two IP addresses account for 56% of exploitation attempts, with distinct post-exploitation payloads observed. Additionally, a coordinated reconnaissance campaign targeting Citrix ADC Gateway and Netscaler Gateway infrastructure was discovered, using residential proxies and an Azure IP address.

    Show sources

Information Snippets