• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft warns of nation state hackers exploiting critical atlassian confluence vulnerability

Microsoft Warns of Nation-State Hackers Exploiting Critical Atlassian Confluence Vulnerability

You are here: Home / General Cyber Security News / Microsoft Warns of Nation-State Hackers Exploiting Critical Atlassian Confluence Vulnerability
October 11, 2023

Microsoft has linked the exploitation of a recently disclosed critical flaw in Atlassian Confluence Info Middle and Server to a nation-state actor it tracks as Storm-0062 (aka DarkShadow or Oro0lxy).

The tech giant’s risk intelligence team said it observed in-the-wild abuse of the vulnerability considering that September 14, 2023.

“CVE-2023-22515 is a critical privilege escalation vulnerability in Atlassian Confluence Information Middle and Server,” the enterprise observed in a series of posts on X (previously Twitter).

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“Any machine with a network relationship to a susceptible software can exploit CVE-2023-22515 to develop a Confluence administrator account in the software.”

Cybersecurity

CVE-2023-22515, rated 10. on the CVSS severity score process, permits remote attackers to make unauthorized Confluence administrator accounts and accessibility Confluence servers. The flaw has been addressed in the following variations –

  • 8.3.3 or later
  • 8.4.3 or afterwards, and
  • 8.5.2 (Extended Term Help release) or later

Though the exact scale of the attacks is not apparent, Atlassian explained that it was manufactured conscious of the trouble by “a handful of shoppers,” indicating it had been exploited as a zero-working day by the threat actor.

It really is worthy of noting that Oro0lxy refers to a electronic alias made by Li Xiaoyu, a Chinese hacker who was accused by the U.S. Division of Justice (DoJ) in July 2020 of infiltrating “hundreds of companies” in the U.S., Hong Kong, and China, like coronavirus vaccine investigation developer Moderna.

Cybersecurity

Xiaoyu is mentioned to have been assigned to the Guangdong regional division of the Ministry of State Security (MSS).

“The defendants in some instances acted for their personal own economic obtain, and in other folks for the benefit of the MSS or other Chinese authorities businesses,” the DoJ said. “The hackers stole terabytes of data which comprised a subtle and prolific danger to U.S. networks.”

Corporations relying on Confluence applications are very suggested to update to the most up-to-date versions to mitigate any possible threats, and also isolate them from the community internet till the fixes are in location.

Discovered this posting interesting? Abide by us on Twitter  and LinkedIn to study far more distinctive content material we submit.


Some areas of this posting are sourced from:
thehackernews.com

Previous Post: «http/2 rapid reset zero day vulnerability exploited to launch record ddos HTTP/2 Rapid Reset Zero-Day Vulnerability Exploited to Launch Record DDoS Attacks
Next Post: Microsoft Releases October 2023 Patches for 103 Flaws, Including 2 Active Exploits microsoft releases october 2023 patches for 103 flaws, including 2»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.