Breaking

Confluence Zero-Day Vulnerability Exploited by Chinese-Backed Threat Group

Microsoft has revealed that a Chinese-backed threat group, known as ‘Storm-0062’ (aka DarkShadow or Oro0lxy), has been actively exploiting a critical privilege escalation zero-day vulnerability in the Atlassian Confluence Data Center and Server since September 14, 2023.

Atlassian Confluence Zero-Day Vulnerability

Atlassian informed its customers about the active exploitation status of CVE-2023-22515 on October 4, 2023. However, specific details regarding the threat groups behind this vulnerability exploitation were withheld.

Today, Microsoft Threat Intelligence analysts have shared additional information about Storm-0062’s involvement in the exploitation of CVE-2023-22515. They have also posted four IP addresses associated with this threat group on Twitter.

Considering that Atlassian released security updates in early October, Storm-0062 exploited this flaw as a zero-day bug for nearly three weeks, creating arbitrary administrator accounts on exposed endpoints.

Storm-0062 hacking group’s motive

Storm-0062 is a state-sponsored hacking group linked to China’s Ministry of State Security. It is well-known for targeting software, engineering, medical research, government, defense, and tech firms in the U.S., U.K., Australia, and various European countries to gather intelligence.

The United States had charged these Chinese hackers in July 2020 for stealing terabytes of data by hacking government organizations and companies worldwide.

Regarding the exploitation of CVE-2023-22515, data collected by cybersecurity company Greynoise suggests that its scope is very limited. However, there’s a potential shift in the exploitation landscape as Rapid7 researchers released a proof-of-concept (PoC) exploit and detailed technical information about the vulnerability.

Rapid7 analysts demonstrated how attackers could bypass existing security checks on the product and utilize a cURL command to send a crafted HTTP request on vulnerable endpoints, thereby creating new administrator users with passwords known to the attacker. Their comprehensive write-up also includes an additional request that ensures other users won’t receive notifications about the setup’s completion, making the compromise stealthier.

Confluence Zero-Day Vulnerability Security Update

Since Atlassian released security updates for the affected products a week ago, users have had ample time to respond before the public release of the PoC exploit.

If you haven’t done so already, it is recommended to upgrade to one of the following fixed Atlassian Confluence releases:

  • 8.3.3 or later
  • 8.4.3 or later
  • 8.5.2 (Long-Term Support release) or later

It’s important to note that the CVE-2023-22515 flaw doesn’t impact Confluence Data Center and Server versions before 8.0.0, so users of older releases need not take any action.

This exemption also applies to Atlassian-hosted instances at atlassian.net domains, which are not vulnerable to these attacks.

For more information on indicators of compromise, upgrade instructions, and a complete list of affected product versions, please refer to Atlassian’s security bulletin.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

7 hours ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

1 week ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 weeks ago

IAM Software: Top 5 IAM Solutions for Enterprise Security

Find the top 5 IAM software solutions, explore their features, and find the best tools…

2 weeks ago

Top 5 MDM Tools for 2024 – Best Mobile Device Management Software

MDM software is used to manage smartphones, tablets, laptops, kiosk devices and iPads and more.…

2 weeks ago

Scalefusion MDM Alternatives: Top 5 Scalefusion Alternatives for IT Decision Makers

Discover the top 5 Scalefusion alternatives for MDM, offering better features, scalability, and integration for…

2 weeks ago