» » Cybercriminals, State-Sponsored Threat Actors Exploiting Confluence Server Vulnerability

Cybercriminals, State-Sponsored Threat Actors Exploiting Confluence Server Vulnerability

Cybercriminals, State-Sponsored Threat Actors Exploiting Confluence Server Vulnerability

House › Cyberwarfare

Cybercriminals, State-Sponsored Risk Actors Exploiting Confluence Server Vulnerability

By Eduard Kovacs on June 13, 2022

Tweet

A not too long ago patched Confluence Server vulnerability is being exploited by a number of cybercrime and state-sponsored menace teams, based on Microsoft.

The safety gap, tracked as CVE-2022-26134, might be exploited by an unauthenticated attacker for distant code execution. It impacts all supported variations of Confluence Server and Knowledge Middle, and it has been patched by Atlassian with the discharge of variations 7.4.17, 7.13.7, 7.14.3, 7.15.2, 7.16.4, 7.17.Four and seven.18.1.

The zero-day vulnerability was exploited earlier than its existence got here to gentle, however the quantity of assaults has elevated considerably following disclosure.

Within the days instantly after the disclosure of the flaw, Censys and Shadowserver reported seeing hundreds of internet-exposed Confluence servers that might have been susceptible to assaults.

The preliminary assaults exploiting CVE-2022-26134 appeared to come back from China and so they targeted on the supply of net shells.

Risk intelligence firm GreyNoise has up to now seen greater than 1,700 distinctive IP addresses trying to use the vulnerability.

Microsoft reported on Saturday that it has seen a number of menace teams, together with profit-driven cybercriminals and state-sponsored actors, exploiting the flaw of their assaults.

“In lots of instances impacted units have been noticed with a number of disparate cases of malicious exercise, together with in depth gadget and area discovery, and the deployment of payloads like Cobalt Strike, net shells, botnets like Mirai and Kinsing, coin miners, and ransomware,” Microsoft mentioned.

The corporate has named two teams which have been noticed focusing on CVE-2022-26134: DEV-0401 and DEV-0234. The previous is a China-based ransomware operator that has been identified to deploy numerous ransomware households, together with LockFile, AtomSilo and Rook.

Within the assaults aimed toward Confluence Server cases, Microsoft has seen the supply of a chunk of ransomware named Cerber2021.

Cloud safety agency Lacework has additionally seen assaults focusing on CVE-2022-26134. These operations concerned the cryptocurrency miners named Kinsing a Hezb, in addition to the Darkish.IoT botnet.

Cybersecurity firm Examine Level has additionally seen assaults delivering cryptocurrency miners, together with to Home windows and Linux methods.

Associated: Atlassian Patches Important Code Execution Vulnerability in Confluence

Associated: Atlassian Patches Important Authentication Bypass Vulnerability in Jira

Associated: USCYBERCOM Warns of Mass Exploitation of Atlassian Vulnerability Forward of Vacation Weekend

Get the Each day Briefing

 
 
 

  • Most Latest
  • Most Learn
  • Drupal Patches ‘Excessive-Threat’ Third-Celebration Library Flaws
  • HYCU Raises $53 Million for Knowledge Backup Know-how
  • Researchers: Wi-Fi Probe Requests Expose Consumer Knowledge
  • Chinese language Hackers Including Backdoor to iOS, Android Web3 Wallets in ‘SeaFlower’ Marketing campaign
  • Facilitating Convergence of Bodily Safety and Cyber Safety With Open Supply Intelligence
  • Lecturers Devise New Speculative Execution Assault In opposition to Apple M1 Chips
  • Cybercriminals, State-Sponsored Risk Actors Exploiting Confluence Server Vulnerability
  • Researcher Exhibits How Tesla Key Card Characteristic Can Be Abused to Steal Vehicles
  • Cybersecurity Programs Ramp Up Amid Scarcity of Professionals
  • Billion-Greenback Valuations Cannot Halt Layoffs at OneTrust, Cybereason

On the lookout for Malware in All of the Incorrect Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Laptop Says About You

Be in a Place to Act Via Cyber Situational Consciousness

Report Exhibits Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice Yr To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

Methods to Determine Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Engaging

Methods to Defend In opposition to DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles