Home » News » Chinese Gov’t Targets Atlassian Vulnerability, Microsoft Warns

Chinese Gov’t Targets Atlassian Vulnerability, Microsoft Warns

Chinese government-linked hackers


Chinese government-linked hackers exploit a significant Atlassian software vulnerability, raising concerns.

Microsoft recently disclosed that hackers linked to China have been actively exploiting a newly discovered vulnerability affecting Atlassian software. The vulnerability, identified as CVE-2023-22515, impacts Atlassian’s Confluence Data Center and Server product and has been exploited by threat actors since September 14.

On October 4, Atlassian issued an advisory along with a patch to address this critical security issue. They also confirmed evidence of a known nation-state actor exploiting the vulnerability, underscoring its severity.

Microsoft urges immediate action, stressing that any vulnerable device can create a Confluence admin account using CVE-2023-22515. They recommend software upgrades and network isolation.

Microsoft assigns the temporary name “Storm-0062” to the hackers, also known as DarkShadow or Oro0lxy. While not explicitly mentioning China, Oro0lxy was linked to China’s Ministry of State Security in a 2020 indictment.

The Microsoft disclosure doesn’t definitively attribute the attack or confirm whether Xiaoyu acted alone.

In 2020, Xiaoyu and a collaborator ran a decade-long campaign targeting various countries, attempting cryptocurrency extortion, and exploiting newly disclosed software vulnerabilities. Their tactics often focused on publicly known software vulnerabilities.

Tom Kellermann, a former Obama administration cybersecurity official, highlights China’s extensive cyber espionage network, which prioritizes acquiring zero-day vulnerabilities. Atlassian vulnerabilities have been previously exploited, demanding increased vigilance against such threats.



Related stories:

Trending

IPVanish VPN review

In the realm of digital security and freedom, IPVanish stands out as a beacon of