
Cybercriminals are now reportedly exploiting known vulnerability CVE-2019-3396 in the software , a workspace productivity tool made by , according to a by security intelligence firm Trend Micro Inc. on May 7.
The exploit that has been developed allows cybercriminals to stealthily install and run a () miner on a vulnerable computer, as well as covering up the activity by using a to hide the malware’s network activity and toll on the host’s central processing unit (CPU).
According to an Atlassian security , the vulnerability in question only applies to some older versions of Confluence. The vulnerability can be avoided by downloading patched versions of Confluence Server and Data Center.
In February, as previously by Cointelegraph, Trend Micro another instance of XMR miner malware attacks. This attack targeted Microsoft Windows users with the Windows exploit tool and remote control program . The vulnerability targeted was Windows SMB Server Vulnerability MS17-010, which has since been patched in 2017.
Crypto attacks are purportedly , according to a by AT&T in March. Per the report, online shopping giant has also been the victim of a miner attack. In this case, the attack was executed on a Kubernetes server operating inside Amazon Web Services.
Published at Wed, 08 May 2019 06:00:24 +0000