Cryptojacking facilitated by critical Atlassian Confluence exploit

Share This Post

[ad_1]

Attacks by the first threat actor involved abuse of the flaw to deploy the XMRig miner while the second threat actor leveraged a shell script to facilitate miner delivery across a targeted environment’s accessible endpoints.

[ad_2]

Source link

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

Do You Want To Boost Your Business?

drop us a line and keep in touch