Security

Cyber-crime

Novel backdoor persists even after critical Confluence vulnerability is patched

Got a Confluence server? Listen up. Malware said to have wide-ranging capabilities


A new backdoor was this week found implanted in the environments of organizations to exploit the recently disclosed critical vulnerability in Atlassian Confluence.

The backdoor provides attackers remote access to a victim, both its Confluence server and other network resources, and is found to persist even after Confluence patches are applied.

Patches were made available from October 31, with Atlassian telling customers at the time they "must take immediate action". Given the vulnerability was suggested to be under mass exploitation as of November 8, the need to apply patches is stronger than ever.

Experts at Aon's incident response provider Stroz Friedberg said the backdoor is a novel piece of malware called Effluence.

"The malware is difficult to detect and organizations with Confluence servers are advised to investigate thoroughly, even if a patch was applied," according to the advisory.

The web shell is implanted in an atypical way, with malware of this kind usually being uploaded via Confluence's plugin system. In these cases, web shells can only be accessed if the attacker is able to log into Confluence or via an attacker-controlled webpage.

In the case observed by the incident responders, Effluence was installed in a way that allowed an unauthenticated attacker to access it. Here, the attacker hijacked the underlying Apache Tomcat webserver and inserted Effluence between it and Confluence, making it available on every web page.

Effluence is capable of executing a rich array of commands, many that align with those of the Godzilla web shell, which according to Unit 42 by Palo Alto Networks, is one that's designed to stealthily maintain access on high-interest networks.

A small selection of Effluence's capabilities:

Detecting and remediating Effluence installations isn't entirely straightforward and will require some manual review on the defender's part. 

Stroz Friedberg recommends manually reviewing installed plugins for malicious activity. Files with .jar extensions in the following directories, as well as other Confluence-related paths, will indicate if a plugin was installed but this won't indicate whether it's malicious or not:

Adding to the difficulty, Effluence doesn't leave behind any indicators of compromise (IOCs). Defenders may find evidence of use when reviewing static confluence pages, monitoring the response size in relation to the organization's baseline range.

The advisory also includes a Yara rule that can detect Effluence use in the preserved memory image.

"Stroz Friedberg has not thoroughly tested to what extent this novel malware is applicable to other Atlassian products," it said. "Several of the web shell functions depend on Confluence-specific APIs. However, the plugin and the loader mechanism appear to depend only on common Atlassian APIs and are potentially applicable to JIRA, BitBucket, or other Atlassian products where an attacker can install the plugin." ®

Send us news
1 Comment

US readies prison cell for another Russian Trickbot developer

Hunt continues for the other elusive high-ranking members

Memory-safe languages so hot right now, agrees Lazarus Group as it slings DLang malware

Latest offensive cyber group to switch to atypical programming for payloads

Atlassian security advisory reveals four fresh critical flaws – in mail with dead links

Bitbucket, Confluence and Jira all in danger, again. Sigh

CISA details twin attacks on federal servers via unpatched ColdFusion flaw

Tardy IT admins likely to get a chilly reception over the lack of updates

Black Basta ransomware operation nets over $100M from victims in less than two years

Assumed Conti offshoot averages 7 figures for each successful attack but may have issues with, er, 'closing deals'

Fancy Bear goes phishing in US, European high-value networks

GRU-linked crew going after our code warns Microsoft - Outlook not good

2.5M patients infected with data loss in Norton Healthcare ransomware outbreak

AlphV lays claims to the intrusion

That call center tech scammer could be a human trafficking victim

Interpol increasingly concerned as abject abuse of victims scales far beyond Asia origins

Five Eyes nations warn Moscow's mates at the Star Blizzard gang have new phishing targets

The Russians are coming! Err, they've already infiltrated UK, US inboxes

Belgian man charged with smuggling sanctioned military tech to Russia and China

Indictments allege plot to shift FPGAs, accelerometers, and spycams

BlackCat ransomware crims threaten to directly extort victim's customers

Accounting software firm Tipalti says it’s investigating alleged break-in of its systems

Hershey phishes! Crooks snarf chocolate lovers' creds

Stealing Kit Kat maker's data?! Give me a break