Skip to content
LATEST NEWS
 2026-04-03 Awazon Market Review  2026-04-03 88kg Cocaine Seized at Luxembourg Airport  2026-04-03 €7M Cannabis Seized in Ireland, Four Arrested  2026-04-03 Drift DeFi Hack Drains $285M in Crypto Assets  2026-04-02 Microsoft Warns of WhatsApp-Delivered Malware Attack

DarkDotWeb

  • ARTICLES
    • ABUSE
    • CRIME
    • CRYPTO CURRENCIES
    • DARKNET
    • DRUG LORDS
    • DRUGS
    • HARM-REDUCTION
    • INTERVIEWS
    • LAW ENFORCEMENT
    • MARKET SEIZURES
    • REVIEWS
    • SECURITY
    • TUTORIALS
    • WEAPONS
  • Harm Reduction
  • Darknet Markets
  • VENDOR SHOPS
  • Cool Links
  • CHAT ROOM
  • DONATE TO US
  • DISCLAIMER
  • CONTACT
  • SEARCH!!!

Bitcoin logo Bitcoin BTC$67141.95

Ethereum logo Ethereum ETH$2056.73

Monero logo Monero XMR$325.17

Litecoin logo Litecoin LTC$53.40

Solana logo Solana SOL$80.56

Dogecoin logo Dogecoin DOGE$0.09

Bitcoin logo Bitcoin BTC$67141.95

Ethereum logo Ethereum ETH$2056.73

Monero logo Monero XMR$325.17

Litecoin logo Litecoin LTC$53.40

Solana logo Solana SOL$80.56

Dogecoin logo Dogecoin DOGE$0.09

Nexus Market Qubez

React2Shell Exploited to Hijack NGINX Web Traffic


Hackers are exploiting the React2Shell flaw to inject malicious NGINX configs and hijack web traffic via attacker-controlled servers.

Security researchers have uncovered an ongoing web traffic hijacking campaign targeting NGINX servers and popular hosting control panels such as Baota (BT), with the goal of rerouting legitimate traffic through attacker-controlled infrastructure.

Datadog Security Labs reported that the activity is linked to exploitation of the critical React2Shell vulnerability. The attackers abuse malicious NGINX configuration files to intercept requests and proxy them to backend systems under their control.

“The malicious configuration sits between users and legitimate websites, silently redirecting traffic,” said security researcher Ryan Simon. “The campaign primarily targets Asian country-code TLDs like .in, .id, .pe, .bd, and .th, Baota-managed Chinese hosting environments, and government and education domains such as .gov and .edu.”

The attack relies on shell scripts that inject rogue “location” blocks into NGINX, an open-source reverse proxy and load balancer. These directives capture requests sent to specific URL paths and forward them to attacker-owned domains using the proxy_pass feature.

Researchers noted that the scripts form a multi-stage toolkit designed to establish persistence and automate the deployment of malicious NGINX configurations. Key components include:

zx.sh, the main controller, which executes later stages using tools like curl or wget, or falls back to raw TCP connections if those utilities are blocked
bt.sh, which specifically targets Baota (BT) Panel environments to overwrite NGINX configuration files
4zdh.sh, which scans common NGINX config paths and reduces errors during file creation
zdh.sh, which focuses on Linux and containerized NGINX deployments, particularly those serving .in and .id domains
ok.sh, which generates reports listing all active traffic hijacking rules on the system

“The toolkit combines target discovery, persistence mechanisms, and automated creation of malicious configuration files to sustain traffic redirection,” Datadog said.

The findings follow a GreyNoise report showing that just two IP addresses were responsible for 56% of observed React2Shell exploitation attempts two months after the vulnerability’s disclosure. Between January 26 and February 2, 2026, GreyNoise recorded exploitation activity from 1,083 unique source IPs.

According to the threat intelligence firm, the most active sources deployed different post-exploitation payloads. One delivered cryptomining software from staging servers, while the other established reverse shells back to the scanning IPs, indicating a preference for hands-on access over automated monetization.

The disclosure also comes amid a separate coordinated reconnaissance effort targeting Citrix ADC and NetScaler Gateway systems. That campaign leveraged tens of thousands of residential proxy IPs alongside a single Microsoft Azure address to identify exposed login interfaces.

“The operation ran in two modes,” GreyNoise said. “One used large-scale proxy rotation to discover login panels, while the other focused on rapid version enumeration from cloud infrastructure. Together, they point to a highly coordinated reconnaissance effort.”


Reports are sourced from official documents, law-enforcement updates, and credible investigations.

Discover additional reports, market trends, crime analysis and Harm Reduction articles on DarkDotWeb to stay informed about the latest dark web operations.


Related Articles

5 1239
FBI Seizes Major Ransomware Forum RAMP
2 1241
Hackers Publish 680,000 Odido Records, Threaten More Leaks
0 831
Dark Web Flooded With 300 Million Leaked Records in 2025
3 1150
Russian ELECTRUM Tied to 2025 Cyber Attack on Power Grid

Post navigation

The Rise and Fall of Dark Market →
← Dutch Police Arrest 10 in Major Drug Trafficking Probe
Pitch
Nexus Market Prime Market Torzon CannaExpress Vortex Market Argo WeTheNorth Fawkes Dream Market
HeyBud NordicMedTech WeAreAmsterdam

LATEST NEWS & ARTICLES

6 1603

Awazon Market Review

 2026-04-03
5 1195

88kg Cocaine Seized at Luxembourg Airport

 2026-04-03
3 1243

€7M Cannabis Seized in Ireland, Four Arrested

 2026-04-03

Copyright © 2026 DarkDotWeb