LexisNexis Cloud Hack: Hackers Crack Legal Giant with a Weak Password – Your Data’s Next?
Hackers from FulcrumSec just confirmed they breached LexisNexis’s AWS cloud setup on February 24, swiping 2GB of juicy data on law firms and government clients.[1][2] They exploited a known React2Shell vulnerability in an unpatched app, then escalated via misconfigured IAM roles and a laughably weak hardcoded DB password: “Lexis1234”.[1]
Dive deeper: Attackers grabbed details on 21,000+ enterprise accounts, 400,000 user profiles, and a full VPC map – think contact info for U.S. judges and DOJ attorneys, even if mostly pre-2020 legacy stuff.[1] LexisNexis contained it, called in forensics, but this is their second big mess in a year under RELX.[1]
So What? Devs and sec teams: If a legal data behemoth leaves React apps unpatched and passwords like “Lexis1234” in code, your cloud stack is low-hanging fruit. Law firms and gov agencies now face phishing hell from exposed client maps – prime supply chain nightmare forcing you to audit every vendor’s IAM and patch hygiene yesterday.[1]
My take: This screams basic opsec failure at scale. Patch your damn React apps, rotate those IAM perms, and ditch hardcoded creds – or FulcrumSec’s got your number next. Wake up, teams.[1]

