You're on your way to the next level! Join the Kudos program to earn points and save your progress.
Level 1: Seed
25 / 150 points
1 badge earned
Challenges come and go, but your rewards stay with you. Do more to earn more!
What goes around comes around! Share the love by gifting kudos to your peers.
Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!
Join now to unlock these features and more
The Atlassian Community can help you and your team get more value out of Atlassian products and practices.
On Wednesday, March 29, 2023, multiple security firms issued warnings about malicious activity coming from a legitimate, signed binary from communications technology company 3CX. The binary, 3CXDesktopApp, is video conferencing software available for download on all major platforms. Rapid7’s threat research teams analyzed the Windows installer and confirmed that it is downloading and executing malicious DLL files. A suspected North Korean threat actor dubbed Labyrinth Chollima gained access to and backdoored the software distribution process for 3CX. This supply chain attack known as 'SmoothOperator' leverages malicious access that was delivered to customers through the auto-update mechanism of the software.
This has nothing to do with Confluence, unless you've decided to install it on the same server and do some integration with it for some reason.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.