Operation PCPcat: A New Threat to React Frameworks
Overview of the Cyber Attack
A recent large-scale cyber espionage operation, dubbed Operation PCPcat, has severely impacted internet infrastructure, compromising over 59,000 servers in a mere 48 hours. This campaign specifically targets systems built with React frameworks, including popular deployments such as Next.js and React Servers. Alarmingly, this operation has already led to the unauthorized collection of hundreds of thousands of user credentials.
Discovery and Investigation
Security experts stumbled upon this troubling operation while analyzing unusual activity across multiple honeypot environments. A deeper dive into the situation revealed a highly automated attack structure connected to a central command-and-control (C2) server based in Singapore. Intriguingly, the attackers appear to be capitalizing on unreported and recently disclosed vulnerabilities to implement remote code execution (RCE) on an astonishing scale.
Attack Statistics
As per the data collected, Operation PCPcat has actively scanned 91,505 IP addresses worldwide, achieving a remarkable 64.6% success rate by compromising 59,128 servers. The operation peaked at approximately 41,000 server compromises daily, positioning it as one of the swiftest attacks ever recorded against React-based deployments.
Vulnerabilities Used in the Attack
The attackers behind PCPcat are exploiting two critical vulnerabilities, specifically noted as CVE-2025-29927 and CVE-2025-66478. These flaws are primarily impacting Next.js deployments, granting the potential for arbitrary code execution.
The assault begins with a mass scan of publicly exposed domains running vulnerable React frameworks. Once a target server is identified, the attackers employ a tactic known as prototype pollution, a recognized vulnerability class in JavaScript. By injecting malicious data through crafted JSON inputs, they manipulate JavaScript object prototypes, tricking the server into executing unauthorized commands. This method allows them to circumvent standard authentication processes, gaining complete access to the impacted React Servers without the need for valid user credentials.
Credential Theft Mechanism
Once access is granted, the malware associated with Operation PCPcat acts as an efficient tool for credential theft, immediately seeking sensitive information stored on the systems. Key targets for data retrieval include:
- .env configuration files
- SSH private keys
- Cloud service credentials
- System environment variables
The data pilfered provides attackers with extended access, potentially infiltrating broader infrastructure components including AWS accounts, Docker environments, and internal networks. Researchers estimate that this operation has already exfiltrated between 300,000 and 590,000 credential sets, heightening the risk for subsequent attacks.
Centralized Command-and-Control Structure
The compromised servers operate through a central C2 system hosted at 67.217.57.240 in Singapore. This server directs the overall operation by assigning new scanning targets and compiling stolen data from infected machines. Significantly, the attackers left an internal statistics dashboard accessible, enabling researchers to observe the operation’s scale and observe how rapidly PCPcat spreads across vulnerable React Servers.
Maintaining Long-Term Access
To ensure long-term access to compromised systems, the malware installs proxy tools such as GOST and Fast Reverse Proxy on the infected servers. Configured as systemd services, these tools guarantee that the malware restarts automatically upon server reboots. Each compromised machine is also programmed to request 2,000 new target IP addresses every 45 minutes from the C2 server. This design fosters a self-sustaining infection loop, allowing Operation PCPcat to propagate swiftly without direct intervention from the attackers.
Defensive Recommendations
In response to Operation PCPcat, organizations utilizing React frameworks and React Servers are urged to assume potential exposure and take urgent actions. Key measures include auditing .env files, rotating credentials, examining logs for suspicious activity, monitoring outbound traffic towards known C2 infrastructures, and employing YARA signatures to detect the PCPcat credential stealer.
This campaign underscores the increasingly significant risks posed to today’s JavaScript ecosystems. The widespread adoption of React and Next.js, coupled with potential misconfigurations or unpatched vulnerabilities, opens doors for extensive compromises that could have durable ramifications for both cloud and enterprise environments.
For security teams aiming to bolster their defenses, it’s vital to stay vigilant, adapt quickly to the evolving tactics of attackers, and leverage advanced threat intelligence solutions to enhance their detection and response capabilities.


