Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Atlassian Confluence Servers Hacked via Zero-Day Vulnerability

Atlassian scrambling to patch Confluence Server zero-day exploited by multiple threat groups

Atlassian customers have been warned that hackers are exploiting a Confluence Server zero-day vulnerability. The flaw is currently unpatched and it appears to have been exploited by multiple threat groups.

Atlassian scrambling to patch Confluence Server zero-day exploited by multiple threat groups

Atlassian customers have been warned that hackers are exploiting a Confluence Server zero-day vulnerability. The flaw is currently unpatched and it appears to have been exploited by multiple threat groups.

According to Atlassian, Confluence Server and Data Center are affected by a critical vulnerability that can be exploited by an unauthenticated attacker for remote code execution. The vendor warned in an advisory published on Thursday that the security hole, tracked as CVE-2022-26134, has been exploited in the wild.

All supported versions of Confluence Server and Data Center are affected. Until a patch becomes available, users have been advised to prevent access to their Confluence servers from the internet, or simply disable these instances. Users can also reduce the risk of attacks by using a firewall to block URLs containing “${“.

Atlassian expects fixes to become available by the end of the day on Friday, June 3.

The vulnerability was reported to Atlassian by Volexity, whose employees discovered the zero-day during an incident response investigation. Details of the vulnerability were reported to the vendor on May 31.

The cybersecurity firm believes multiple threat actors are currently exploiting CVE-2022-26134 and noted that “the likely country of origin of these attackers is China.”

In a blog post published on Thursday, Volexity said the attacks it observed involved the delivery of JSP webshells, specifically a variant of China Chopper, as well as bash shells. These shells can give the attackers full control over the compromised Confluence server.

Advertisement. Scroll to continue reading.

Once they gained access to Confluence systems, the attackers deployed an in-memory copy of BEHINDER, a popular web server implant whose source code is available on GitHub.

“BEHINDER provides very powerful capabilities to attackers, including memory-only webshells and built-in support for interaction with Meterpreter and Cobalt Strike,” Volexity explained.

The company added, “Once BEHINDER was deployed, the attacker used the in-memory webshell to deploy two additional webshells to disk: China Chopper and a custom file upload shell.”

The hackers executed various commands on the victim’s systems, including for reconnaissance and accessing Confluence databases. They also attempted to alter web access logs to remove evidence of exploitation.

Volexity has released indicators of compromise (IoCs), as well as other information that can be useful to defenders.

The US Cybersecurity and Infrastructure Security Agency (CISA) has also informed organizations about the flaw, which it added to its Known Exploited Vulnerabilities Catalog. Federal agencies have been instructed to immediately take steps to reduce the risk of exploitation.

Related: Atlassian Patches Critical Code Execution Vulnerability in Confluence

Related: Atlassian Patches Critical Authentication Bypass Vulnerability in Jira

Related: USCYBERCOM Warns of Mass Exploitation of Atlassian Vulnerability Ahead of Holiday Weekend

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.