The article "UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications" by Cisco Talos discusses a significant security incident involving the exploitation of vulnerabilities in Next.js, a popular JavaScript framework for building server-side rendered (SSR) web applications. The attackers leveraged these vulnerabilities to inject malicious code into SSR data and harvest sensitive credentials from compromised systems.
Key Points:
-
Vulnerability Details:
- CVE-2025-55182: This vulnerability, also known as React2Shell, allows attackers to inject server-side secrets into the
__NEXT_DATA__object used by Next.js applications. - The attack vector involves manipulating SSR data injection points in Next.js.
- CVE-2025-55182: This vulnerability, also known as React2Shell, allows attackers to inject server-side secrets into the
-
Attack Methodology:
- Attackers injected malicious code that triggered a script execution on the server side, leading to credential harvesting.
- Malicious scripts were spawned from
/tmp/, often with randomized dot-prefixed names (e.g.,/.e40e7da0c.sh). - The use of
nohupcommands was observed in process listings, indicating persistent execution of malicious scripts.
-
**Imp
Read the full article at Malware Analysis, News and Indicators - Latest topics
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.

![[AINews] The Unreasonable Effectiveness of Closing the Loop](/_next/image?url=https%3A%2F%2Fmedia.nemati.ai%2Fmedia%2Fblog%2Fimages%2Farticles%2F600e22851bc7453b.webp&w=3840&q=75)



