Cryptojacking facilitated by critical Atlassian Confluence exploit

Share This Post



Attacks by the first threat actor involved abuse of the flaw to deploy the XMRig miner while the second threat actor leveraged a shell script to facilitate miner delivery across a targeted environment’s accessible endpoints.



Source link

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

Do You Want To Boost Your Business?

drop us a line and keep in touch