In a remarkable turn of events, researchers from Cisco Talos gained direct insight into a large-scale credential harvesting campaign by accessing the attackers' own backend infrastructure. A threat group, tracked as UAT-10608, was found actively exploiting CVE-2025-55182, a critical pre-authentication remote code execution (RCE) vulnerability in Next.js applications known as "React2Shell." The group's automated framework was compromising hundreds of hosts per day, exfiltrating credentials, API keys, and tokens to a database. However, a security misconfiguration by the attackers left their web-based dashboard for this database unprotected, allowing Talos researchers to observe the stolen data in real-time. The data included sensitive credentials for services like Amazon Web Services (AWS) and GitHub. Talos is now in the process of notifying the hundreds of victim organizations.
The campaign centers on the mass exploitation of CVE-2025-55182 (React2Shell), a vulnerability disclosed four months prior. This RCE flaw in Next.js allows an unauthenticated attacker to execute arbitrary code by sending a malicious serialized payload to a Server Function endpoint.
The threat group UAT-10608 built an automated system to scan the internet for vulnerable servers and exploit them. The exploit payload was designed to harvest sensitive information from the compromised hosts, such as login credentials, environment variables, API keys, and access tokens. This data was then sent to a central database controlled by the attackers. In a display of poor operational security, the attackers' web application used to view and manage this stolen data was left exposed to the internet without a password, granting the Talos researchers a direct view into their operation.
T1190 - Exploit Public-Facing Application. The entire campaign relies on the mass exploitation of the public-facing React2Shell vulnerability, CVE-2025-55182.T1552.001 - Credentials In Files to read configuration files, or T1552.005 - Cloud API Credentials to steal AWS or other cloud provider keys.The impact is widespread, affecting at least 766 hosts compromised in a single 24-hour period. Each compromised server represents a significant breach. The theft of AWS and GitHub credentials is particularly damaging, as these can be used to compromise entire cloud environments, access and poison source code repositories, or launch further supply chain attacks. For the victim organizations, this incident means not only is their web server compromised, but their core cloud and development infrastructure is also at immediate risk. The swift notification by Talos is critical to help these victims respond before the stolen credentials can be fully abused.
The most important mitigation is to patch the CVE-2025-55182 vulnerability in all Next.js applications.
Use dedicated secrets management solutions instead of storing credentials in files or environment variables on web servers.
Implement a Web Application Firewall (WAF) with rules to detect and block deserialization attacks targeting this vulnerability.
Apply strict egress filtering to web servers to prevent them from connecting to unauthorized external databases or C2 servers.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats