Cryptojacking facilitated by critical Atlassian Confluence exploit

Attacks by the first threat actor involved abuse of the flaw to deploy the XMRig miner while the second threat actor leveraged a shell script to facilitate miner delivery across a targeted environment's accessible endpoints.

Article Link: Cryptojacking facilitated by critical Atlassian Confluence exploit | SC Media