• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Latest Cybersecurity News

Confluence Zero-Day Vulnerability Exploited by Chinese-Backed Threat Group

John Greenwood Posted On October 11, 2023
0



Confluence Zero-Day Vulnerability

Microsoft has revealed that a Chinese-backed threat group, known as ‘Storm-0062’ (aka DarkShadow or Oro0lxy), has been actively exploiting a critical privilege escalation zero-day vulnerability in the Atlassian Confluence Data Center and Server since September 14, 2023.

Atlassian Confluence Zero-Day Vulnerability

Atlassian informed its customers about the active exploitation status of CVE-2023-22515 on October 4, 2023. However, specific details regarding the threat groups behind this vulnerability exploitation were withheld.

Today, Microsoft Threat Intelligence analysts have shared additional information about Storm-0062’s involvement in the exploitation of CVE-2023-22515. They have also posted four IP addresses associated with this threat group on Twitter.

Considering that Atlassian released security updates in early October, Storm-0062 exploited this flaw as a zero-day bug for nearly three weeks, creating arbitrary administrator accounts on exposed endpoints.

Storm-0062 hacking group’s motive

Storm-0062 is a state-sponsored hacking group linked to China’s Ministry of State Security. It is well-known for targeting software, engineering, medical research, government, defense, and tech firms in the U.S., U.K., Australia, and various European countries to gather intelligence.

The United States had charged these Chinese hackers in July 2020 for stealing terabytes of data by hacking government organizations and companies worldwide.

Regarding the exploitation of CVE-2023-22515, data collected by cybersecurity company Greynoise suggests that its scope is very limited. However, there’s a potential shift in the exploitation landscape as Rapid7 researchers released a proof-of-concept (PoC) exploit and detailed technical information about the vulnerability.

Microsoft has observed nation-state threat actor Storm-0062 exploiting CVE-2023-22515 in the wild since September 14, 2023. CVE-2023-22515 was disclosed on October 4, 2023. Storm-0062 is tracked by others as DarkShadow or Oro0lxy.

— Microsoft Threat Intelligence (@MsftSecIntel) October 10, 2023

Rapid7 analysts demonstrated how attackers could bypass existing security checks on the product and utilize a cURL command to send a crafted HTTP request on vulnerable endpoints, thereby creating new administrator users with passwords known to the attacker. Their comprehensive write-up also includes an additional request that ensures other users won’t receive notifications about the setup’s completion, making the compromise stealthier.

Confluence Zero-Day Vulnerability Security Update

Since Atlassian released security updates for the affected products a week ago, users have had ample time to respond before the public release of the PoC exploit.

If you haven’t done so already, it is recommended to upgrade to one of the following fixed Atlassian Confluence releases:

  • 8.3.3 or later
  • 8.4.3 or later
  • 8.5.2 (Long-Term Support release) or later

It’s important to note that the CVE-2023-22515 flaw doesn’t impact Confluence Data Center and Server versions before 8.0.0, so users of older releases need not take any action.

This exemption also applies to Atlassian-hosted instances at atlassian.net domains, which are not vulnerable to these attacks.

For more information on indicators of compromise, upgrade instructions, and a complete list of affected product versions, please refer to Atlassian’s security bulletin.

Share the article with your friends


Data Breachhackingvulnerability


Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

You may also like
The Ultimate Windows Patch Management Handbook: Best Practices & Tools
January 22, 2024
Top 6 Best Vulnerability Management Software for 2024
December 21, 2023
CISA Alert: Ongoing Adobe ColdFusion Vulnerability Exploitation in Government Servers
December 6, 2023
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search