{"id":3601,"date":"2026-04-02T19:30:00","date_gmt":"2026-04-02T19:30:00","guid":{"rendered":"http:\/\/infosec-daily.com\/?page_id=3601"},"modified":"2026-04-02T19:30:00","modified_gmt":"2026-04-02T19:30:00","slug":"hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=3601","title":{"rendered":"Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials"},"content":{"rendered":"<p>A\u00a0large-scale credential harvesting operation\u00a0has been\u00a0observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web Services (AWS) secrets, shell command history, Stripe API keys, and GitHub tokens at\u00a0scale.<br \/>\nCisco\u00a0Talos has attributed the operation to a threat cluster it tracks\u00a0as<\/p>","protected":false},"excerpt":{"rendered":"<p>A\u00a0large-scale credential harvesting operation\u00a0has been\u00a0observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web Services (AWS) secrets, shell command history, Stripe&hellip;<\/p>\n","protected":false},"author":1,"featured_media":3602,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-3601","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/3601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3601"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/3601\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/3602"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}