Bernard Aybouts - Blog - Miltonmarketing.com

Approx. read time: 2.4 min.

Post: Hackers attack Confluence Servers, hijack power for cryptocurrency mining

Hackers Target Confluence Servers for Illicit Cryptocurrency Mining

Hackers have recently launched attacks on Confluence Servers to exploit their resources for illicit cryptocurrency mining, primarily targeting Monero. According to Trend Micro, the attackers are taking advantage of CVE-2019–3396, a vulnerability within the Widget Connector macro of Atlassian Confluence Server. This flaw allows for path traversal and remote code execution through server-side injection, enabling hackers to hijack system resources.

On March 20, 2019, Atlassian released a patch to address this critical security flaw, along with a fix for CVE-2019-3395, which resolved a WebDAV endpoint vulnerability. This issue allowed attackers to send arbitrary HTTP and WebDAV requests from Confluence Server or Data Center instances.

The Mining Campaign Targets Unpatched Servers

Despite the availability of patches, many Confluence systems remain unpatched, leaving them vulnerable to exploitation. In this recent campaign, hackers aim to mine Monero on compromised servers. Researchers Augusto Remillano II and Robert Malagad from Trend Micro report that CVE-2019-3396 was previously exploited to drop Gandcrab ransomware but is now used to deliver rootkits and cryptocurrency mining malware onto unprotected systems.

The infection process begins when the attacker sends a remote command to fetch a shell script from Pastebin. This initial script has capabilities to kill processes and download a second shell script, which eventually leads to the download of a third script from Pastebin. These scripts work together to install the Kerberods Trojan dropper.

Kerberods and Cryptocurrency Mining

Once installed, the Kerberods malware deploys the “khugepageds” cryptocurrency miner, which has been flagged as Coinminer.Linux.MALXMR.UWEJI, alongside a rootkit. The rootkit helps mask the mining activities from system administrators by concealing the miner’s resource usage.

Hackers Attack Confluence Servers, Hijack Power For Cryptocurrency Mining

The rootkit is delivered as code that is later compiled using GCC. Additionally, Kerberods is capable of spreading across networks via SSH using vulnerabilities in Jenkins automation servers, specifically CVE-2019-1003001 and CVE-2019-1003000. These security flaws allow for arbitrary code execution, facilitating the further spread of the malware.

Both Kerberods and its rootkit employ custom packers, making it harder for analysts to detect and analyze the malware. The rootkit hides the mining processes and forges CPU usage data to evade detection, effectively concealing the presence of cryptocurrency mining malware.

Urgent Need for Patch Application

Due to the widespread exploitation of Confluence Servers, it is crucial for system administrators to apply Atlassian’s patches immediately to secure their systems from these ongoing attacks.

Sources:

The Longevity Blueprint: AI-Powered Health Optimization

Current step:1AI-Human Medical Analyzer: Smarter, Personalized Health
2AI-Human Medical Analyzer: Smarter, Personalized Health

> SYS.HEALTH: AI-Human Medical Analyzer_

// Revolutionize Your Diagnostics

Experience the perfect blend of cutting-edge AI precision and expert human care. Our revolutionary analyzer turns your raw health data into personalized, actionable insights tailored just for you.

> INITIALIZING_BIOMETRIC_SCAN...

[+] DATA_INPUT

Securely upload complex health parameters, including lab bloodwork and comprehensive medical history.

[+] PROCESSING

Advanced algorithmic parsing combined with human-level oversight ensures hyper-accurate data interpretation.

[+] OUTPUT_MATRIX

Receive smarter, faster, and truly personalized care strategies to take immediate charge of your health journey.

A name/nickname is required to continue.

> TRANSLATION_MATRIX_ACTIVE...
[ LANG_EN ]
Knowledge Heals, Prevention Protects
[ LANG_HI ]
ज्ञान ठीक करता है, रोकथाम सुरक्षा करती है
[ LANG_ZH ]
知识治愈,预防保护
[ LANG_JA ]
知識は癒し、予防は守る
[ LANG_HE ]
הידע מרפא, המניעה מגנה
[ LANG_AR ]
المعرفة تُشفي، والوقاية تحمي
[ LANG_FR ]
La connaissance guérit, la prévention protège

> SYS.AUTH: Data Processing Consent_

[ AWAITING_AUTHORIZATION ] By providing consent, you allow us to process your uploaded data through our proprietary AI-Human analysis system.

  • [+] SECURE_REVIEW: This ensures your information is carefully reviewed using advanced AI technology and certified professional oversight to deliver personalized health insights.
  • [+] PRIVACY_LOCK: Your privacy is our strict priority. Your data will only be used for this specific diagnostic purpose.

> SYS.UPLOAD: Share Medical Records [OPTIONAL]_

[ USER_CONTROL_ACTIVE ] Uploading your medical records during registration is entirely optional. You can choose to bypass this step and provide data later if it suits your timeline.

You dictate the data flow: share as much or as little as you’re comfortable with, and let us guide you toward better health.

[+] FORMAT_SUPPORT

We accept all file formats, including photos, PDFs, text documents, and raw official medical data.

[+] DATA_YIELD

Increased inputs correlate with higher precision. The more info you share, the better we tailor your personalized insights.

> NEXT_STEPS: Post-Registration Protocol_

Once your registration is complete, a human specialist from our team will personally reach out to you within 3-10 business days. We will discuss your health journey and map out exactly how we can support you.

About the Author: Bernard Aybout (Virii8)

Avatar Of Bernard Aybout (Virii8)
I am a dedicated technology enthusiast with over 45 years of life experience, passionate about computers, AI, emerging technologies, and their real-world impact. As the founder of my personal blog, MiltonMarketing.com, I explore how AI, health tech, engineering, finance, and other advanced fields leverage innovation—not as a replacement for human expertise, but as a tool to enhance it. My focus is on bridging the gap between cutting-edge technology and practical applications, ensuring ethical, responsible, and transformative use across industries. MiltonMarketing.com is more than just a tech blog—it's a growing platform for expert insights. We welcome qualified writers and industry professionals from IT, AI, healthcare, engineering, HVAC, automotive, finance, and beyond to contribute their knowledge. If you have expertise to share in how AI and technology shape industries while complementing human skills, join us in driving meaningful conversations about the future of innovation. 🚀