Executive Summary
In early February 2026, a sophisticated cyberattack targeted NGINX servers, leading to unauthorized redirection of user traffic through attacker-controlled infrastructure. The threat actors exploited vulnerabilities in NGINX configurations, particularly by injecting malicious 'location' blocks into existing configuration files. This manipulation allowed them to intercept and reroute incoming requests without triggering standard security alerts, as the abuse leveraged legitimate directives like 'proxy_pass'. The campaign primarily affected websites with Asian top-level domains and government and educational institutions, compromising the integrity and confidentiality of user data.
This incident underscores the critical need for organizations to regularly audit and secure their web server configurations. The attackers' method of embedding malicious instructions within NGINX configuration files highlights the evolving sophistication of cyber threats and the importance of proactive defense measures to prevent similar breaches.
Why This Matters Now
The exploitation of NGINX configurations for traffic redirection demonstrates a growing trend in cyberattacks targeting web server infrastructure. Organizations must prioritize the security of their server configurations to prevent unauthorized access and data breaches.
Attack Path Analysis
Attackers compromised NGINX servers by injecting malicious configuration directives, enabling them to redirect user traffic through their infrastructure. They leveraged this access to escalate privileges within the server environment, facilitating lateral movement to other systems. Establishing command and control channels, they exfiltrated sensitive data and manipulated user traffic, resulting in significant operational impact.
Kill Chain Progression
Initial Compromise
Description
Attackers gained access to NGINX servers by injecting malicious configuration directives into existing files, allowing them to intercept and redirect user traffic.
Related CVEs
CVE-2025-24514
CVSS 8.8A vulnerability in ingress-nginx allows attackers to inject arbitrary NGINX directives via the 'auth-url' annotation, potentially leading to remote code execution and disclosure of secrets accessible to the controller.
Affected Products:
Kubernetes ingress-nginx – < 1.12.1
Exploit Status:
exploited in the wildCVE-2025-1974
CVSS 9.8A vulnerability in ingress-nginx allows attackers to load and execute arbitrary shared libraries via the 'ssl_engine' directive, potentially leading to remote code execution and full cluster compromise.
Affected Products:
Kubernetes ingress-nginx – < 1.12.1
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Server Software Component
Valid Accounts
Masquerading
Application Layer Protocol
Exfiltration Over Web Service
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Security of Public-Facing Web Applications
Control ID: 6.6
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Network and Environment Segmentation
Control ID: Pillar 3
NIS2 Directive – Security Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Government Administration
Government sites (.gov domains) directly targeted for NGINX traffic manipulation, enabling state-sponsored surveillance and data interception through compromised infrastructure redirects.
Higher Education/Acadamia
Educational institutions (.edu domains) specifically targeted for traffic hijacking attacks, exposing student data and research communications to unauthorized backend infrastructure monitoring.
Internet
Web hosting providers and internet infrastructure companies face systematic NGINX configuration compromise, enabling large-scale traffic manipulation and proxy-based surveillance campaigns.
Information Technology/IT
IT service providers using NGINX and Baota panels vulnerable to multi-stage toolkit attacks that inject malicious proxy configurations while maintaining service availability.
Sources
- Hackers compromise NGINX servers to redirect user traffichttps://www.bleepingcomputer.com/news/security/hackers-compromise-nginx-servers-to-redirect-user-traffic/Verified
- CVE-2025-24514 - ingress-nginx controller - configuration injection via unsanitized auth-url annotationhttps://cvefeed.io/vuln/detail/CVE-2025-24514Verified
- CVE-2025-1974: The IngressNightmare in Kuberneteshttps://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilitiesVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the attacker's ability to escalate privileges, move laterally, and exfiltrate data by enforcing strict segmentation and identity-aware policies.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's ability to exploit misconfigurations may have been constrained, reducing the likelihood of unauthorized access.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to escalate privileges within the server environment could have been limited, reducing the scope of their malicious activities.
Control: East-West Traffic Security
Mitigation: The attacker's lateral movement across the network could have been constrained, limiting their ability to access additional systems.
Control: Multicloud Visibility & Control
Mitigation: The attacker's ability to establish and maintain command and control channels could have been limited, reducing their persistent access.
Control: Egress Security & Policy Enforcement
Mitigation: The attacker's ability to exfiltrate sensitive data could have been constrained, reducing the risk of data breaches.
The overall impact of the attack could have been reduced, limiting data breaches and service disruptions.
Impact at a Glance
Affected Business Functions
- Web Traffic Management
- Load Balancing
- Reverse Proxy Services
Estimated downtime: 3 days
Estimated loss: $50,000
Potential exposure of sensitive configuration files and user traffic data.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to enforce least privilege access and prevent unauthorized lateral movement.
- • Deploy East-West Traffic Security controls to monitor and restrict internal traffic flows, mitigating lateral movement risks.
- • Utilize Multicloud Visibility & Control solutions to detect and respond to anomalous interactions and suspicious automation.
- • Enforce Egress Security & Policy Enforcement to control outbound traffic and prevent data exfiltration.
- • Regularly audit and harden NGINX configurations to prevent unauthorized modifications and reduce the attack surface.



