BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Automated Credential Theft Campaigns Surge as React2Shell Exploits Target Next.js Apps

Automated Credential Theft Campaigns Surge as React2Shell Exploits Target Next.js Apps

highMalware & Threats|April 6, 20262 min read

Originally reported by BleepingComputer, Checkpoint Research, Malwarebytes Labs

#phishing#credential-theft#react2shell#qr-codes#automation#nextjs#supply-chain
Share

TL;DR

Attackers are exploiting React2Shell (`CVE-2025-55182`) in Next.js applications for automated credential harvesting while QR code-based traffic violation scams target U.S. consumers. The European Commission confirmed a data breach through supply chain compromise.

Why high?

Automated exploitation of React2Shell vulnerability in Next.js applications represents a high-severity threat due to the widespread deployment of these frameworks and the scalable nature of the attack campaign.

Automated Credential Theft Campaigns Surge as React2Shell Exploits Target Next.js Apps

Threat actors are leveraging multiple attack vectors this week, from automated web application exploitation to social engineering via QR codes, while supply chain compromises continue impacting high-profile targets.

React2Shell Vulnerability Drives Large-Scale Credential Harvesting

Security researchers have identified a large-scale automated campaign exploiting React2Shell (CVE-2025-55182) vulnerabilities in Next.js applications. The campaign focuses on systematic credential theft through automated exploitation techniques targeting vulnerable web applications built on the popular React framework.

The automated nature of these attacks represents a significant escalation in threat actor capabilities, allowing for scalable credential harvesting across multiple targets simultaneously. Organizations running Next.js applications should prioritize patching and implementing additional authentication controls.

QR Code Phishing Targets U.S. Traffic Violation Scams

Scammers have evolved traditional SMS phishing by incorporating QR codes into fake traffic violation notices. The campaign impersonates state courts across the United States, sending "Notice of Default" text messages that direct recipients to scan QR codes leading to fraudulent payment portals.

The scam demands $6.99 payments while harvesting personal and financial information from victims. The use of QR codes adds a layer of obfuscation, making it harder for recipients to immediately identify malicious URLs before scanning.

Security teams should educate users about QR code risks and implement scanning policies that require URL preview before navigation.

European Commission Breach Linked to Trivy Supply Chain Attack

Check Point Research reports that the European Commission confirmed a data breach affecting its Europa.eu platform. The compromise occurred through a third-party exchange connected to the Trivy supply chain attack, highlighting the persistent threat posed by software supply chain vulnerabilities.

This incident underscores the cascading impact of supply chain compromises, where initial vulnerabilities in widely-used tools can lead to breaches across multiple organizations and government entities.

Weekly Intelligence Roundups Highlight Persistent Threats

Threat intelligence providers continue tracking evolving attack patterns, with Malwarebytes Labs and Check Point Research publishing weekly summaries of significant security events. These reports provide security teams with consolidated views of the current threat landscape.

The consistent publication of threat intelligence bulletins reflects the high volume of security incidents requiring ongoing monitoring and response across multiple sectors.

Sources

  • https://www.bleepingcomputer.com/news/security/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts/
  • https://www.bleepingcomputer.com/news/security/hackers-exploit-react2shell-in-automated-credential-theft-campaign/
  • https://research.checkpoint.com/2026/6th-march-threat-intelligence-report-2/
  • https://www.malwarebytes.com/blog/news/2026/04/a-week-in-security-march-30-april-5-2
  • https://www.malwarebytes.com/blog/podcast/2026/04/killer-robots-are-here-now-what-lock-and-code-s07e07

Originally reported by BleepingComputer, Checkpoint Research, Malwarebytes Labs

Tags

#phishing#credential-theft#react2shell#qr-codes#automation#nextjs#supply-chain

Related Intelligence

  • Supply Chain Strikes and Social Engineering: Five Active Threat Campaigns Targeting Critical Infrastructure

    highMar 28, 2026
  • TeamPCP Trojans LiteLLM Package in Supply Chain Attack

    highMar 25, 2026
  • North Korean Actors Target Axios npm Maintainer with Fake Microsoft Teams Fix

    highApr 5, 2026

Related Knowledge

  • NERF Deep Training: Malware Analysis, Reverse Engineering, and Evasion Techniques

    offensive
  • Malware Analysis Deep Dive — NERF Training Module

    dfir
  • DFIR & Threat Hunting Deep Training — NERF Knowledge Base

    dfir

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← BrowserGate Report Exposes LinkedIn's Tracking of 6,000+ Browser Extensions