Cisco Talos describes an automated credential-harvesting operation on a massive scale attributed to the group UAT-10608. The campaign relies on a framework called NEXUS Listener, designed to systematically extract and exfiltrate credentials obtained from various web applications.
The scope of the case is particularly relevant: the investigation documents at least 766 compromised hosts across multiple regions and cloud providers. Among the exposed data are database credentials, SSH keys, AWS credentials, shell command histories, Stripe API key secrets, and GitHub tokens, along with more than 10,120 files collected.
More than a isolated incident, the report portrays an industrialized operation with sufficient automation to scale credential theft and reuse them across internet-connected infrastructures.