Em Atlassian Confluence Server é encontrado vulnerabilidade pela qual os invasores podem fazer upload de programas de malware

Os cibercriminosos usam ativamente vulnerabilidade crítica no Atlassian Confluence Server para pirataria remota do Linux- e-servidores Windows.

Euntruders install extortionate software as GandGrab e Dofloo (outros nomes são AES.DDoS e Sr.. Preto) sobre servidores comprometidos.

A questão está em injeção de modelo no Widget Connector (CVE-2019-3396) that allows remote attacker to perform catalogue bypass and perform random code on settings of Confluence Server and Data Center.

Augusto II Remillano, security specialist from Trend Micro companhia, relatórios:

“This malware variant can perform DDoS attacks, Execução Remota de Código, and cryptocurrency mining on systems that run vulnerable versions of Confluence Server and Data Center. Atlassian already took steps to fix these issues and recommended that users upgrade to the latest version (6.15.1)”

Currently vulnerability has many exploits. First arrived on April 10, and cybercriminals immediately added it to their arsenal. Began mass scanning that searched from vulnerable settings Confluence Server and Data Center that aimed infecting them with extortionate software GandCrab.

After compromising a server, intruders on the controlled machine download a set of tools Empire PowerShell, with the use of it the upload achived GandCrab version. De acordo com Logic alerta especialistas, for bypassing is exploited CertUtil LOLBin.

TrendMicro report on twitter
TrendMicro report on twitter

Through the vulnerability CVE-2019-3396 intruders also install Dofloo Malware. This malware program assists in uniting of large quantities of crashed servers in botnets for DDos-attacks (with the use of SYN, LSYN, UDP, UDPS and TCP – floods) and cryptocurrency mining.

Augusto II Remillano from TrendMicro gave the following safety tips:

Continuous monitoring in software development should be practiced in order to flag security risks in servers, data centers, and other computing environments. Since the successful exploitation of CVE-2019-3396 in Atlassian Confluence Server can put resources at risk, enterprises should be able to identify vulnerabilities, make use of the latest threat intelligence against malware or exploits, and detect modifications to the application’s design and the underlying infrastructure that hosts it.

Sobre Trojan Killer

Carry Trojan Killer portátil em seu memory stick. Certifique-se que você é capaz de ajudar o seu PC resistir a quaisquer ameaças cibernéticas onde quer que vá.

Além disso, verifique

MageCart na Cloud Platform Heroku

Os investigadores encontraram vários MageCart Web Skimmers Em Heroku Cloud Platform

Pesquisadores da Malwarebytes informou sobre encontrar vários skimmers MageCart web na plataforma Heroku nuvem …

Android Spyware CallerSpy

máscaras spyware CallerSpy como uma aplicação de chat Android

Trend Micro especialistas descobriram a CallerSpy malwares, que mascara como uma aplicação de chat Android, …

Deixar uma resposta