Article Details

Scrape Timestamp (UTC): 2024-08-30 06:15:46.485

Source: https://thehackernews.com/2024/08/atlassian-confluence-vulnerability.html

Original Article Text

Click to Toggle View

Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns. Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence Data Center and Confluence Server to conduct illicit cryptocurrency mining on susceptible instances. "The attacks involve threat actors that employ methods such as the deployment of shell scripts and XMRig miners, targeting of SSH endpoints, killing competing crypto mining processes, and maintaining persistence via cron jobs," Trend Micro researcher Abdelrahman Esmail said. The security vulnerability exploited is CVE-2023-22527, a maximum severity bug in older versions of Atlassian Confluence Data Center and Confluence Server that could allow unauthenticated attackers to achieve remote code execution. It was addressed by the Australian software company in mid-January 2024. Trend Micro said it observed a high number of exploitation attempts against the flaw between mid-June and end of July 2024 that leveraged it to drop the XMRig miner on unpatched hosts. At least three different threat actors are said to be behind the malicious activity - "With its continuous exploitation by threat actors, CVE-2023-22527 presents a significant security risk to organizations worldwide," Esmail said. "To minimize the risks and threats associated with this vulnerability, administrators should update their versions of Confluence Data Center and Confluence Server to the latest available versions as soon as possible."

Daily Brief Summary

MALWARE // Crypto Miners Exploit Atlassian Confluence Vulnerability

Threat actors are exploiting a critical flaw in Atlassian Confluence Data Center and Server, identified as CVE-2023-22527, for illicit cryptocurrency mining operations.

This vulnerability, enabling remote code execution, was patched by Atlassian in mid-January 2024 but continues to be exploited on unpatched systems.

The exploits observed by Trend Micro mostly involved the deployment of shell scripts and XMRig mining software, aiming to generate cryptocurrency by utilizing the resources of the compromised servers.

Techniques used include targeting SSH endpoints, shutting down competing mining operations, and establishing persistence through cron jobs.

A significant number of attack attempts were recorded between mid-June and the end of July 2024, indicating ongoing interest and activity from cybercriminals.

At least three separate threat groups are believed to be involved in these activities, leveraging the security gap to install cryptocurrency mining tools on vulnerable systems.

To mitigate the risks, it's crucial for administrators to update to the latest versions of Confluence Data Center and Server promptly.