• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
alert: 'effluence' backdoor persists despite patching atlassian confluence servers

Alert: ‘Effluence’ Backdoor Persists Despite Patching Atlassian Confluence Servers

You are here: Home / General Cyber Security News / Alert: ‘Effluence’ Backdoor Persists Despite Patching Atlassian Confluence Servers
November 10, 2023

Cybersecurity researchers have found out a stealthy backdoor named Effluence which is deployed adhering to the prosperous exploitation of a not long ago disclosed security flaw in Atlassian Confluence Details Heart and Server.

“The malware functions as a persistent backdoor and is not remediated by applying patches to Confluence,” Aon’s Stroz Friedberg Incident Reaction Solutions mentioned in an assessment published before this week.

“The backdoor offers capacity for lateral motion to other network resources in addition to exfiltration of knowledge from Confluence. Importantly, attackers can access the backdoor remotely with out authenticating to Confluence.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The attack chain documented by the cybersecurity entity entailed the exploitation of CVE-2023-22515 (CVSS rating: 10.), a critical bug in Atlassian that could be abused to make unauthorized Confluence administrator accounts and obtain Confluence servers.

Atlassian has considering the fact that disclosed a next flaw recognised as CVE-2023-22518 (CVSS score: 10.) that an attacker can also consider edge of to established up a rogue administrator account, ensuing in a total decline of confidentiality, integrity, and availability.

What would make the newest attack stand out is that the adversary attained preliminary entry via CVE-2023-22515 and embedded a novel web shell that grants persistent distant entry to every single web page on the server, like the unauthenticated login website page, without having the need to have for a valid person account.

The web shell, manufactured up of a loader and payload, is passive, enabling requests to pass by it unnoticed until a ask for matching a distinct parameter is presented, at which issue it triggers its destructive actions by executing a collection of steps.

This contains generating a new admin account, purging logs to cover up the forensic trail, working arbitrary commands on the underlying server, enumerating, reading through, and deleting documents, and compiling substantial details about the Atlassian atmosphere.

Cybersecurity

The loader component, for each Aon, acts as a normal Confluence plugin and is liable for decrypting and launching the payload.

“A number of of the web shell features count on Confluence-specific APIs,” security researcher Zachary Reichert said.

“On the other hand, the plugin and the loader system show up to rely only on prevalent Atlassian APIs and are most likely relevant to JIRA, Bitbucket, or other Atlassian products and solutions the place an attacker can install the plugin.”

Discovered this short article appealing? Observe us on Twitter  and LinkedIn to read through far more exclusive content material we post.


Some areas of this article are sourced from:
thehackernews.com

Previous Post: «iran linked imperial kitten cyber group targeting middle east's tech sectors Iran-Linked Imperial Kitten Cyber Group Targeting Middle East’s Tech Sectors
Next Post: The New 80/20 Rule for SecOps: Customize Where it Matters, Automate the Rest the new 80/20 rule for secops: customize where it matters,»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.