A massive credential harvesting operation codenamed UAT-10608 has been discovered exploiting the React2Shell vulnerability to steal crypto-related credentials at scale. The attack targets database credentials, SSH private keys, AWS secrets, shell command history, Stripe API keys, and GitHub tokens across at least 766 compromised hosts spanning multiple geographic regions and cloud providers. Cisco Talos attributes this sophisticated operation to a threat cluster that uses automated scripts for credential extraction and exfiltration to command-and-control servers. The campaign particularly threatens crypto developers and traders who store API keys and wallet credentials on compromised systems. Post-compromise, attackers leverage automated scripts to extract sensitive information from various applications before posting to C2 infrastructure, creating ongoing risks for cryptocurrency operations and trading platforms.
React2Shell Vulnerability Exploited in Large-Scale Credential Harvesting Operation
T
The Hacker News
Friday, April 3, 2026·5 min read·Web3
#credential theft#React2Shell#developer security#API keys
Related Articles
Web3
SparkCat Malware Returns to App Stores, Targets Crypto Wallet Recovery Phrases
The Hacker News·Apr 4, 2026
Web3
Supply Chain Attacks Target Crypto Firms Through Axios NPM Package Compromise
Benzinga·Apr 4, 2026
Web3
Major Web3 events shelved, marking first cancellations of 2026
TheStreet Crypto·Apr 4, 2026
