Create
cancel
Showing results for 
Search instead for 
Did you mean: 
Sign up Log in

It's not the same without you

Join the community to find out what other Atlassian users are discussing, debating and creating.

Atlassian Community Hero Image Collage

Confluence exploit - recovery tips

We've been busy as a team working through support efforts for instances affected by recent exploits arising from Confluence vulnerabilities published at:

  1. https://confluence.atlassian.com/doc/confluence-security-advisory-2019-04-17-968660855.html
  2. https://confluence.atlassian.com/doc/confluence-security-advisory-2019-03-20-966660264.html

There's been some pretty busy community posts arising from these as sys-admin teams work to secure and upgrade affected systems, including:

  1. https://community.atlassian.com/t5/Confluence-discussions/khugepageds-eating-all-of-the-CPU/td-p/1055337
  2. https://community.atlassian.com/t5/Confluence-questions/WARNING-Confluence-server-hacked/qaq-p/1054136
  3. https://community.atlassian.com/t5/Confluence-questions/How-come-my-confluence-installation-was-hacked-by-Kerberods/qaq-p/1054605

One of our team, @Jeff Turner took the time to write a detailed advisory note on the steps you should be taking to secure a compromised system whilst balancing the need to gather evidence of the exploit and minimising service disruption.

In Australia, that means also considering the notification criteria published by the Australian Cyber Security Centre and the threshold for Notifiable Data Breaches scheme, which is a legal obligation locally.

By communicating with Cyber response agencies in your respective country, you're helping to make co-ordinating agencies aware of the issue to minimise damage and shorten the recovery window.

If you're not yet using the Atlassian Incident Management Playbook, now would be a very good time to start.

1 comment

(pasting in response from Jeff on another post)

According to this alertlogic.com blog, this vulnerability is also being exploited to launch ransomware.

I'm pretty sure this just happened to us yesterday. We had a zero-day ransomware spider to a few of our servers. We ended up pin-pointing it back to our Confluence server. 

Funny thing is, we already had the workaround implemented for our instance. 

https://confluence.atlassian.com/doc/confluence-security-advisory-2019-04-17-968660855.html

Any one else experiencing this?

Haven't seen anything further, but have you alerted Atlassian security of its existence despite applying the workaround?

Yep, sure did. Turned out it was for an exploit that we were never informed of. They apparently had issues notifying their tech emails, so we were left in the dark. 

https://confluence.atlassian.com/doc/confluence-security-advisory-2019-03-20-966660264.html 

Comment

Log in or Sign up to comment
TAGS

Community Events

Connect with like-minded Atlassian users at free events near you!

Find an event

Connect with like-minded Atlassian users at free events near you!

Unfortunately there are no Community Events near you at the moment.

Host an event

You're one step closer to meeting fellow Atlassian users at your local event. Learn more about Community Events

Events near you