LexisNexis Cloud Hack: Hackers Crack Legal Giants with a Lame Password and Unpatched App
Legal data powerhouse LexisNexis just confirmed a nasty cloud breach where hackers snagged 2GB of sensitive client info from law firms and government agencies.[1] The attack kicked off on February 24 when FulcrumSec exploited an unpatched React2Shell vulnerability in their AWS setup, then escalated via a hardcoded weak password (“Lexis1234”) and overly permissive IAM roles.[1][5]
Technically, React2Shell is a max-severity (CVSS 10.0) flaw disclosed in November 2025, with patches out by early December—yet LexisNexis left it hanging.[5] Attackers exfiltrated details on 21,000+ enterprise accounts, 400,000 user profiles, and even a full VPC map, leaked on dark web forums.[1] No fresh PII like SSNs, but legacy government contacts (U.S. judges, DOJ attorneys) are now hacker bait.[1]
So What? Devs and sec teams: This screams supply chain nightmare. If you’re hooked into LexisNexis or any cloud vendor, audit your third-party exposures NOW—phishing waves and intel ops are incoming for legal/gov clients.[1] Hardcoded creds and lazy IAM? Rookie mistakes that nuked a “trusted” provider, proving even giants crumble without basic hygiene.[1]
My take: LexisNexis’s second RELX breach in a year? Fire the CISO. Patch your React apps, lock down IAM, and ditch weak passwords—or become the next headline. Wake up, cloud teams.[1]

