Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Atlassian Confluence Vulnerability Exploited by Crypto Mining Companies
Global Security

Atlassian Confluence Vulnerability Exploited by Crypto Mining Companies

AdminBy AdminAugust 30, 2024No Comments2 Mins Read
Atlassian Confluence Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 30, 2024Ravi LakshmananCryptojacking / Vulnerability

Atlas Fusion Vulnerability

Threat actors are actively exploiting a patched critical security flaw affecting the Atlassian Confluence data center and Confluence server to conduct illegal cryptocurrency mining on sensitive instances.

“Attacks involve threat actors using techniques such as deploying shell scripts and XMRig miners, targeting SSH endpoints, killing competing crypto mining processes, and maintaining security through cron jobs,” Trend Micro researcher Abdelrahman Esmail. said.

Cyber ​​security

Exploited security vulnerability CVE-2023-22527a maximum severity bug in older versions of Atlassian Confluence Data Center and Confluence Server that could allow unauthenticated attackers to achieve remote code execution. In mid-January 2024, an Australian software development company addressed it.

Trend Micro said that between mid-June and the end of July 2024, there were a large number of attempts to exploit the flaw that used it to disable the XMRig miner on unpatched hosts. At least three different threat actors are said to be behind the malware –

  • Running the XMRig miner via an ELF file payload using specially crafted queries
  • Using a shell script that first stops competing crypto-hacking companies (such as Kinsing), deletes all existing cron jobs, removes cloud security tools from Alibaba and Tencent, and collects system information before setting up a new cron job that checks for commands and monitor (C2) server connection every five minutes and start miner
Cyber ​​security

“Due to continued exploitation by threats, CVE-2023-22527 poses a significant security risk to organizations around the world,” Esmail said.

“To minimize the risk and threat associated with this vulnerability, administrators should update their versions of Confluence Data Center and Confluence Server to the latest available versions as soon as possible.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025

Microsoft Patches 67 vulnerability, including Zero-Day Webdav, is exploited in the wild

June 11, 2025

Researchers disclose configuration risks, including five CVE, in the Salesforce Industry Cloud

June 10, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.