Credential Harvesting - Inside UAT-10608's Operations

Basically, a group is stealing passwords from web apps using automated tools.
Cisco Talos reveals a major credential harvesting operation by UAT-10608, compromising 766 hosts. The attackers exploit vulnerabilities in Next.js applications to steal sensitive data. Organizations must act quickly to secure their systems and mitigate risks.
What Happened
Cisco Talos has uncovered a large-scale automated credential harvesting campaign attributed to a threat cluster known as UAT-10608. This operation primarily targets Next.js applications that are vulnerable to a specific flaw known as React2Shell (CVE-2025-55182). By exploiting these vulnerabilities, the attackers have compromised at least 766 hosts across various regions and cloud providers.
How It Works
The UAT-10608 campaign utilizes a framework called NEXUS Listener. This framework automates the extraction and exfiltration of credentials, SSH keys, cloud tokens, and environment secrets. The attackers deploy scripts that run automatically, collecting sensitive information without further manual intervention. The data is then sent to a command and control (C2) server, where it is organized and made accessible through a web-based interface.
Who's Being Targeted
The operation has indiscriminately targeted public-facing web applications, particularly those built with Next.js. The attackers use automated scanning tools to identify vulnerable applications, leveraging data from services like Shodan and Censys. The broad scope of this campaign means that many organizations could potentially be affected, especially those using vulnerable configurations.
Signs of Infection
Organizations may notice unusual activity on their web applications, such as unexpected access to sensitive data or spikes in traffic. Additionally, if any credentials or SSH keys are compromised, there may be signs of unauthorized access or account takeovers.
What Data Was Exposed
The data harvested from compromised systems includes:
- SSH private keys from 78% of hosts
- AWS credentials from 25.6% of hosts
- Live Stripe API keys and other sensitive tokens
- Database connection strings with cleartext passwords This extensive data exposure poses significant risks, including potential fraud and unauthorized access to cloud resources.
Implications for Organizations
The implications of this operation are severe. Every credential collected should be considered compromised, leading to potential account takeovers and fraudulent activities. Organizations must act swiftly to secure their systems and monitor for any signs of exploitation.
Recommended Actions
To mitigate risks, organizations should:
- Patch vulnerable applications immediately, especially those using Next.js.
- Rotate all exposed credentials and implement multi-factor authentication (MFA).
- Monitor logs for any suspicious activity and conduct thorough security audits.
- Engage with security partners to address any compromised credentials and improve overall security posture.