Nation-state hackers exploiting Atlassian Confluence zero-day bug

Nation-state hackers exploiting Atlassian Confluence zero-day bug

Nation-state threat actors are actively exploiting a recently patched zero-day flaw affecting Atlassian Confluence Data Center and Server instances.

The zero-day vulnerability (CVE-2023-22515) allows to create unauthorized Confluence administrator accounts and access Confluence instances. The issue impacts Confluence Server and Data Center 8.0.0 to 8.5.1. At the beginning of October, Atlassian released an urgent patch to address the flaw.

Microsoft said that a threat actor it tracks as Storm-0062 (aka DarkShadow and Oro0lxy) has been exploiting this bug since September 14, 2023. Previously, the tech giant linked the Storm-0062 group to the Chinese government.

In July 2020, the US Department of Justice charged two Chinese hackers, LI Xiaoyu (aka Oro0lxy) and Dong Jiazhi, working with China’s Ministry of State Security with hacking into computer systems of government organizations and companies worldwide.

Microsoft has shared four IP addresses that were seen sending related exploit traffic targeting CVE-2023-22515.

Additionally, Atlassian updated its security advisory to say it has evidence that a known nation-state actor is actively exploiting CVE-2023-22515.

Users are urged to upgrade their Confluence Data Center and Server instances to fixed versions.


Back to the list

Latest Posts

Ukrainian cyberpolice dismantled phishing group behind illegal property deregistrations

Ukrainian cyberpolice dismantled phishing group behind illegal property deregistrations

The group used phishing emails to infect targets with malware granting remote access to the devices.
14 April 2025
New precision-validating phishing scheme targeting high-value accounts

New precision-validating phishing scheme targeting high-value accounts

The technique is designed to engage only with verified, legitimate email addresses.
14 April 2025
Pakistan-linked threat actor expands targeting in India with new CurlBack RAT

Pakistan-linked threat actor expands targeting in India with new CurlBack RAT

The group has also moved from using HTA files to MSI packages as the primary method for deploying the malware.
14 April 2025