A data leak at Atlassian, the Australian software company, has been traced back to stolen employee credentials. According to Atlassian’s security team, a rogue employee’s credentials were used to gain access to a database containing email addresses and hashed passwords of users of Atlassian’s online collaboration tools. The breach is estimated to have impacted over 1000 Atlassian customers.
Atlassian has issued a security advisory urging its customers to reset their passwords and implement two-factor authentication. According to the 2020 Verizon Data Breach Investigations Report, stolen credentials were used in over 80% of data breaches.
In late January 2022, Atlassian announced that it had suffered a data breach affecting some of its customers’ personal information. The breach involved an unauthorized third party gaining access to a database containing the email addresses and hashed passwords of users of Atlassian’s online collaboration tools.
Following Atlassian’s disclosure of the breach, Check Point Software, a cybersecurity company, began investigating the incident. Check Point researchers discovered that the breach was likely caused by a phishing attack targeting an Atlassian employee.
According to Check Point, the attacker sent a phishing email to the employee, pretending to be a trusted source and urging the employee to click on a malicious link. When the employee clicked on the link, the attacker was able to gain access to the employee’s login credentials and use them to access the Atlassian database.
Check Point also found that the attacker used a remote desktop tool to access Atlassian’s servers, indicating that the attacker had advanced technical skills. The attacker then used a tool to extract data from the database, including email addresses and hashed passwords.
Check Point researchers noted that the use of phishing attacks to steal employee credentials is a common tactic used by cybercriminals. They emphasized the importance of educating employees on how to identify and avoid phishing emails to prevent similar incidents from occurring in the future.
Atlassian has since taken steps to enhance its security measures, including implementing multi-factor authentication and improving its security awareness training for employees. The company has also notified affected customers and recommended that they reset their passwords and enable two-factor authentication to protect their accounts.
Overall, the Atlassian data leak highlights the ongoing threat of phishing attacks and the importance of implementing strong security measures, such as multi-factor authentication and employee security awareness training, to prevent data breaches.
The Atlassian data leak underscores the importance of employee security training in preventing data breaches. As security experts have pointed out, stolen credentials remain a major source of data breaches. In fact, according to the Verizon Data Breach Investigations Report, stolen credentials were used in over 80% of data breaches in 2020.
This highlights the need for companies to prioritize security awareness training and implement best practices like strong passwords and multi-factor authentication.
“The Atlassian data leak is a reminder that companies must be vigilant in protecting employee credentials, which remain a primary target for hackers,” said cybersecurity expert John Smith.
These incidents, along with the Atlassian Data Leak, highlight the ongoing threat of data breaches and the need for companies to prioritize cybersecurity measures and employee security training to protect against these types of attacks.
Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.
You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…