Mass exploitation of Atlassian Confluence CVE-2021-26084 is ongoing and expected to accelerate. Please patch immediately if you haven’t already— this cannot wait until after the weekend.
— USCYBERCOM Cybersecurity Alert (@CNMF_CyberAlert) September 3, 2021
CVE-2021-26084 exploit activity also detected from 2.57.33.43 (??) as of 2021-09-02T06:46:57Z. pic.twitter.com/kbl9zEXgNA
— Bad Packets (@bad_packets) September 2, 2021
As if just having to use Confluence wasn’t bad enough… https://t.co/YipP6mk5I1
— jstrauss (@jstrauss) September 4, 2021
“Please patch immediately if you haven’t already -- this cannot wait until after the weekend.” https://t.co/WOvPKkpS5M
— Ryan Naraine (@ryanaraine) September 3, 2021
@CNMF_CyberAlert & @CISAgov sound alarm just before #LaborDay weekend in U.S., urging orgs to patch a critical vulnerability (CVE-2021-26084) affecting @Atlassian Confluence Server. @dynamicCISO #girlswhocode #100daysofcode https://t.co/TBPTKKrVGL
— Rahul Neel Mani (@rneelmani) September 4, 2021
Patch yo sh!t https://t.co/xTio933JfR
— Lucy_? (@82Lucybravo) September 3, 2021
"Atlassian Confluence flaw under active attack"https://t.co/KRD2Thqepm
— Bad Packets (@bad_packets) September 3, 2021
"Atlassian Confluence flaw actively exploited to install cryptominers"https://t.co/O40ECvJnPa
"Critical flaw in Atlassian Confluence actively exploited"https://t.co/wRZKbWQSWu pic.twitter.com/tPPON2297K
Seems to affect specialised software running only on some servers
— Mira K McMullen (@MiraTweeta) September 3, 2021
https://t.co/AIthwYDcJd
On September 02, the number of Atlassian Confluence servers vulnerable to CVE-2021-26084 was 11,689: https://t.co/AjmZPCR7qx
— Catalin Cimpanu (@campuscodi) September 4, 2021
Background story: https://t.co/eY1pnf9Brn pic.twitter.com/watJTKYKa1