Web Traffic Hijacking: Understanding Malicious NGINX Configurations (2026)

Imagine your website's traffic being silently rerouted through a cybercriminal's servers, exposing your users' data and compromising your online presence. This is the chilling reality of a large-scale web traffic hijacking campaign currently targeting NGINX installations and management panels like Baota (BT). But here's where it gets even more alarming: this campaign leverages malicious NGINX configurations, a tactic that's both sophisticated and surprisingly effective.

Cybersecurity researchers at Datadog Security Labs have lifted the veil on this ongoing threat, revealing its connection to the notorious React2Shell vulnerability (CVE-2025-55182, CVSS score: 10.0). Think of it as a digital backdoor, allowing attackers to sneak into systems and manipulate web traffic flow. The attackers exploit this vulnerability to inject malicious code into NGINX configurations, essentially hijacking legitimate traffic and redirecting it through their own infrastructure.

And this is the part most people miss: This campaign isn't just about stealing data; it's about control. Security researcher Ryan Simon explains, "The malicious configuration acts like a digital tollbooth, intercepting traffic between users and websites and forcing it through the attacker's servers." This allows them to monitor user activity, inject malicious content, or even launch further attacks.

The campaign specifically targets Asian top-level domains (.in, .id, .pe, .bd, .th), Chinese hosting infrastructure (Baota Panel), and government and educational websites (.edu, .gov). This suggests a targeted approach, potentially aiming to gather sensitive information or disrupt critical services.

The attackers employ a multi-stage toolkit, a digital arsenal designed for persistence and stealth. This toolkit includes:

  • zx.sh: The mastermind, orchestrating the attack by executing subsequent stages using tools like curl or wget. If these tools are blocked, it resorts to raw TCP connections for communication.
  • bt.sh: A specialist targeting Baota (BT) Management Panel environments, overwriting NGINX configuration files with malicious code.
  • 4zdh.sh: The scout, identifying common NGINX configuration locations and minimizing errors during the injection process.
  • zdh.sh: The precision striker, focusing on Linux or containerized NGINX setups and targeting specific top-level domains like .in and .id.
  • ok.sh: The reporter, generating a detailed log of all active traffic hijacking rules, allowing attackers to monitor their success.

This sophisticated toolkit highlights the attackers' determination and technical prowess. GreyNoise, a threat intelligence firm, reports that just two IP addresses are responsible for over half of the observed exploitation attempts, indicating a highly organized and focused campaign. Interestingly, the attackers seem more interested in interactive access through reverse shells than simply mining cryptocurrency, suggesting a more insidious agenda.

This campaign follows on the heels of another disturbing discovery: a coordinated reconnaissance effort targeting Citrix ADC Gateway and Netscaler Gateway infrastructure. This operation utilized a massive network of residential proxies and a single Microsoft Azure IP address to systematically scan for login panels, likely laying the groundwork for future attacks.

The implications are chilling. This campaign demonstrates the evolving sophistication of cybercriminals and the constant threat posed to web infrastructure. It's a stark reminder that even widely used tools like NGINX can be weaponized.

What does this mean for you? If you're running an NGINX server, especially in the targeted regions or sectors, vigilance is crucial. Regularly update your software, monitor for unusual activity, and consider implementing additional security measures.

This attack raises important questions: Are we doing enough to secure our web infrastructure? How can we better protect ourselves against these increasingly sophisticated threats? Let's continue the conversation in the comments below.

Web Traffic Hijacking: Understanding Malicious NGINX Configurations (2026)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Terence Hammes MD

Last Updated:

Views: 5740

Rating: 4.9 / 5 (49 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Terence Hammes MD

Birthday: 1992-04-11

Address: Suite 408 9446 Mercy Mews, West Roxie, CT 04904

Phone: +50312511349175

Job: Product Consulting Liaison

Hobby: Jogging, Motor sports, Nordic skating, Jigsaw puzzles, Bird watching, Nordic skating, Sculpting

Introduction: My name is Terence Hammes MD, I am a inexpensive, energetic, jolly, faithful, cheerful, proud, rich person who loves writing and wants to share my knowledge and understanding with you.