Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape
/Incidents
Incidents
/
Confluence exploited for cryptojacking

Confluence exploited for cryptojacking

Type
Campaign
Actors
❓Unknown
Pub. date
August 28, 2024
Initial access
1-day vulnerability
Impact
Resource hijacking
Observed techniques
Cloud compute cryptojacking
Observed tools
XMRig
Targeted technologies
Confluence Server
References
https://www.trendmicro.com/en_us/research/24/h/cve-2023-22527-cryptomining.html
Status
Finalized
Last edited
Sep 19, 2024 1:00 PM

The critical vulnerability CVE-2023-22527 is being actively exploited for cryptojacking activities, turning affected Confluence Data Center and Server instances into cryptomining networks. Attackers exploit this vulnerability through methods like deploying shell scripts and XMRig miners, targeting SSH endpoints, and maintaining persistence via cron jobs. These attacks involve the execution of remote code on vulnerable systems, allowing unauthorized mining of cryptocurrency by leveraging the affected servers' resources.

Atlassian released a security advisory on January 16, 2024, urging organizations to update their Confluence instances to the latest versions to mitigate this risk. The exploitation involves three main threat actors, with tactics such as killing competing cryptomining processes, deleting cron jobs, and installing new ones for persistence.

Made with 💙 by Wiz

Last Updated: April 3, 2025