Security News > 2022 > August > Hackers Exploited Atlassian Confluence Bug to Deploy Ljl Backdoor for Espionage

Hackers Exploited Atlassian Confluence Bug to Deploy Ljl Backdoor for Espionage
2022-08-05 14:21

A threat actor is said to have "Highly likely" exploited a security flaw in an outdated Atlassian Confluence server to deploy a never-before-seen backdoor against an unnamed organization in the research and technical services sector.

"The evidence indicates that the threat actor executed malicious commands with a parent process of tomcat9.exe in Atlassian's Confluence directory," the company said.

"After the initial compromise, the threat actor ran various commands to enumerate the local system, network, and Active Directory environment."

The Atlassian vulnerability suspected to have been exploited is CVE-2022-26134, an Object-Graph Navigation Language injection flaw that paves the way for arbitrary code execution on a Confluence Server or Data Center instance.

The attack chain is also notable for the deployment of a previously undocumented implant called Ljl Backdoor on the compromised server.

"The victim denied the threat actor the ability to laterally move within the environment by taking the server offline, potentially preventing the exfiltration of additional sensitive data and restricting the threat actor(s) ability to conduct further malicious activities."


News URL

https://thehackernews.com/2022/08/hackers-exploited-atlassian-confluence.html

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2022-06-03 CVE-2022-26134 Expression Language Injection vulnerability in Atlassian Confluence Data Center
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance.
network
low complexity
atlassian CWE-917
critical
9.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Atlassian 58 56 291 41 34 422