Breaking

Confluence Zero-Day Vulnerability Exploited by Chinese-Backed Threat Group

Microsoft has revealed that a Chinese-backed threat group, known as ‘Storm-0062’ (aka DarkShadow or Oro0lxy), has been actively exploiting a critical privilege escalation zero-day vulnerability in the Atlassian Confluence Data Center and Server since September 14, 2023.

Atlassian Confluence Zero-Day Vulnerability

Atlassian informed its customers about the active exploitation status of CVE-2023-22515 on October 4, 2023. However, specific details regarding the threat groups behind this vulnerability exploitation were withheld.

Today, Microsoft Threat Intelligence analysts have shared additional information about Storm-0062’s involvement in the exploitation of CVE-2023-22515. They have also posted four IP addresses associated with this threat group on Twitter.

Considering that Atlassian released security updates in early October, Storm-0062 exploited this flaw as a zero-day bug for nearly three weeks, creating arbitrary administrator accounts on exposed endpoints.

Storm-0062 hacking group’s motive

Storm-0062 is a state-sponsored hacking group linked to China’s Ministry of State Security. It is well-known for targeting software, engineering, medical research, government, defense, and tech firms in the U.S., U.K., Australia, and various European countries to gather intelligence.

The United States had charged these Chinese hackers in July 2020 for stealing terabytes of data by hacking government organizations and companies worldwide.

Regarding the exploitation of CVE-2023-22515, data collected by cybersecurity company Greynoise suggests that its scope is very limited. However, there’s a potential shift in the exploitation landscape as Rapid7 researchers released a proof-of-concept (PoC) exploit and detailed technical information about the vulnerability.

Rapid7 analysts demonstrated how attackers could bypass existing security checks on the product and utilize a cURL command to send a crafted HTTP request on vulnerable endpoints, thereby creating new administrator users with passwords known to the attacker. Their comprehensive write-up also includes an additional request that ensures other users won’t receive notifications about the setup’s completion, making the compromise stealthier.

Confluence Zero-Day Vulnerability Security Update

Since Atlassian released security updates for the affected products a week ago, users have had ample time to respond before the public release of the PoC exploit.

If you haven’t done so already, it is recommended to upgrade to one of the following fixed Atlassian Confluence releases:

  • 8.3.3 or later
  • 8.4.3 or later
  • 8.5.2 (Long-Term Support release) or later

It’s important to note that the CVE-2023-22515 flaw doesn’t impact Confluence Data Center and Server versions before 8.0.0, so users of older releases need not take any action.

This exemption also applies to Atlassian-hosted instances at atlassian.net domains, which are not vulnerable to these attacks.

For more information on indicators of compromise, upgrade instructions, and a complete list of affected product versions, please refer to Atlassian’s security bulletin.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Recast Software: Advanced Endpoint Management and Security Tools for IT Teams

Recast Software offers a suite of tools designed to enhance and simplify endpoint management in…

4 months ago

Patch My PC: Streamlined Software Management for ConfigMgr and Intune

Patch My PC is a widely-used solution that simplifies third-party application management by automating app…

4 months ago

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

4 months ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

5 months ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

6 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

6 months ago