GitHub, Next.js, Stripe and AWS: Hackers Compromised 700+ Next.js Hosts by Exploiting React2Shell Vulnerability

GitHub, Next.js, Stripe and AWS: Hackers Compromised 700+ Next.js Hosts by Exploiting React2Shell Vulnerability

Massive Credential Theft Campaign Exploits React2Shell Flaw in Next.js Applications

Cybersecurity researchers at Cisco Talos have uncovered a large-scale automated credential theft campaign orchestrated by the hacker group UAT-10608, which has compromised over 700 servers worldwide. The attackers are exploiting CVE-2025-55182 (React2Shell), a critical remote code execution (RCE) vulnerability in React Server Components used by Next.js applications.

The flaw allows attackers to send maliciously crafted web requests to vulnerable servers, executing arbitrary commands without requiring authentication or user interaction. Once exploited, the attack deploys a malicious script that silently extracts sensitive data, including database credentials, SSH keys, AWS cloud tokens, Stripe payment keys, and GitHub access tokens.

To manage the stolen data, the threat actors use a custom web dashboard called the "NEXUS Listener", which recorded 766 compromised hosts in just 24 hours. The impact is severe:

  • Over 90% of affected servers had database credentials stolen.
  • Nearly 80% lost private SSH keys, enabling lateral movement across networks.
  • Stolen cloud credentials could allow attackers to hijack entire cloud environments.
  • Compromised GitHub tokens risk malicious code injections into software updates.

The campaign highlights the urgent need for organizations using Next.js to patch the React2Shell vulnerability and rotate exposed credentials. The stolen data provides attackers with persistent access to critical systems, posing long-term security risks.

Source: https://cybersecuritynews.com/700-next-js-hosts-exploited/

Amazon Web Services (AWS) cybersecurity rating report: https://www.rankiteo.com/company/amazon-web-services

Vercel cybersecurity rating report: https://www.rankiteo.com/company/vercel

GitHub cybersecurity rating report: https://www.rankiteo.com/company/github

Stripe cybersecurity rating report: https://www.rankiteo.com/company/stripe

"id": "AMAVERGITSTR1775204764",
"linkid": "amazon-web-services, vercel, github, stripe",
"type": "Cyber Attack",
"date": "4/2026",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'location': 'Worldwide', 'type': 'Servers'}],
 'attack_vector': 'Remote Code Execution (RCE)',
 'data_breach': {'data_exfiltration': 'Yes',
                 'sensitivity_of_data': 'High',
                 'type_of_data_compromised': 'Credentials, SSH keys, cloud '
                                             'tokens, payment keys, access '
                                             'tokens'},
 'description': 'Cybersecurity researchers at Cisco Talos have uncovered a '
                'large-scale automated credential theft campaign orchestrated '
                'by the hacker group UAT-10608, which has compromised over 700 '
                'servers worldwide. The attackers are exploiting '
                'CVE-2025-55182 (React2Shell), a critical remote code '
                'execution (RCE) vulnerability in React Server Components used '
                'by Next.js applications. The flaw allows attackers to send '
                'maliciously crafted web requests to vulnerable servers, '
                'executing arbitrary commands without requiring authentication '
                'or user interaction. Once exploited, the attack deploys a '
                'malicious script that silently extracts sensitive data, '
                'including database credentials, SSH keys, AWS cloud tokens, '
                'Stripe payment keys, and GitHub access tokens. The threat '
                "actors use a custom web dashboard called the 'NEXUS Listener' "
                'to manage the stolen data, which recorded 766 compromised '
                'hosts in just 24 hours.',
 'impact': {'data_compromised': 'Database credentials, SSH keys, AWS cloud '
                                'tokens, Stripe payment keys, GitHub access '
                                'tokens',
            'operational_impact': 'Persistent access to critical systems, risk '
                                  'of lateral movement, cloud environment '
                                  'hijacking, malicious code injections',
            'payment_information_risk': 'Stripe payment keys compromised',
            'systems_affected': 'Over 700 servers worldwide'},
 'initial_access_broker': {'entry_point': 'React2Shell vulnerability '
                                          '(CVE-2025-55182) in Next.js '
                                          'applications'},
 'lessons_learned': 'Urgent need for organizations using Next.js to patch the '
                    'React2Shell vulnerability and rotate exposed credentials. '
                    'Stolen data provides attackers with persistent access to '
                    'critical systems, posing long-term security risks.',
 'post_incident_analysis': {'corrective_actions': 'Patch the vulnerability, '
                                                  'rotate credentials, monitor '
                                                  'for lateral movement and '
                                                  'unauthorized access',
                            'root_causes': 'Exploitation of unpatched '
                                           'React2Shell vulnerability '
                                           '(CVE-2025-55182) in Next.js '
                                           'applications'},
 'recommendations': 'Patch the React2Shell vulnerability (CVE-2025-55182) and '
                    'rotate all exposed credentials, including database '
                    'credentials, SSH keys, cloud tokens, payment keys, and '
                    'GitHub access tokens.',
 'references': [{'source': 'Cisco Talos'}],
 'response': {'remediation_measures': 'Patch the React2Shell vulnerability, '
                                      'rotate exposed credentials'},
 'threat_actor': 'UAT-10608',
 'title': 'Massive Credential Theft Campaign Exploits React2Shell Flaw in '
          'Next.js Applications',
 'type': 'Credential Theft',
 'vulnerability_exploited': 'CVE-2025-55182 (React2Shell)'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.