LOGO_CRYPTO_SIGHT

Cybercriminals to Exploit Confluence Vulnerability With Rootkit

By Anne W. | May 9, 2019
thecryptosight-cybercriminals-to-exploit-confluence-vulnerability-with-rootkit
Cybercriminals to Exploit Confluence Vulnerability With Rootkit

Security intelligence firm Trend Micro Inc. has released a report about CVE-2019-3396 exploitation, a critical vulnerability involving Confluence, with its latest update providing a new rootkit version.

CVE-2019-3396 exploitation has been commonly used to attack crypto miners, especially to exploit Monero (XMR). Now, the latest version of this malware comes with a rootkit that allows hackers to keep their activities invisible to users.

The new rootkit comes as a powerful weapon with more functions. The older rootkit can only affect the mining process, while the new rootkit can affect certain files, network traffic, and even CPU usage.

According to Atlassian’s report published this March, cybercriminals are ready and raring to exploit any vulnerabilities. However, users can avoid this by downloading patched versions of Confluence Server and Data Center.

Recently, the United States Patent and Trademark Office (USPTO) has reportedly granted a blockchain patent to Texas-based human-centric cybersecurity firm Forcepoint, as The Crypto Sight reported on April 12.

Earlier in March, Cybersecurity firm Kaspersky Lab has warned that Lazarus continues to evolve, and is expanding its ways of launching hacks and attacks online.

Tags: , , , , ,

Comments