Incidents

Software company Jenkins become victim of cyber attack. Developers confirm presence of cryptomining software

Jenkins security teams confirmed the detection of a successful cyberattack targeting Confluence, a service that has already reached the end of its useful life. According to the report, Jenkins responded immediately by disconnecting the attacked server and cutting off the spread of the infection, ensuring that hackers failed to access source code or more sensitive material.

During this attack, hackers would have exploited CVE-2021-26084, a severe vulnerability in Confluence that allowed software to be installed to mine the Monero cryptocurrency in the container running the affected service. Confluence integrated with our integrated identity system that also powers Jira, Artifactory, and many other services.


After containing the attack, Jenkins began taking the necessary steps to remove the infection and start a chain of trust with the developers. As part of these measures, passwords for all developer accounts were reset and an improved password reset system will be implemented to address future security incidents.

By this time, Jenkins’ infrastructure team has already permanently disabled the Confluence service, in addition to rotating privileged credentials and taking proactive steps to further reduce the scope of the attack: “We are working closely with our colleagues at the Linux Foundation and Continuous Delivery Foundation to ensure that infrastructure that is not directly managed by the Jenkins project is also analyzed,” added the experts.


In October 2019, confluence’s server became read-only and effectively wasted for daily use within the project. At that time, jenkins’ team began migrating documentation and change logs from the wiki to GitHub repositories. That migration has been ongoing, with hundreds of plugins and many other documentation pages moved from the wiki to GitHub repositories.

To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.


To Top

Pin It on Pinterest

Share This