{"id":24004,"date":"2026-04-07T15:32:33","date_gmt":"2026-04-07T08:32:33","guid":{"rendered":"https:\/\/fpt-is.com\/en\/?post_type=goc_nhin_so&#038;p=24004"},"modified":"2026-04-07T16:48:14","modified_gmt":"2026-04-07T09:48:14","slug":"atlassian-jira-emerging-security-risks-in-the-cloud-ecosystem-atlassian-jira-emerging-security-risks-in-cloud-platforms","status":"publish","type":"goc_nhin_so","link":"https:\/\/fpt-is.com\/en\/insights\/atlassian-jira-emerging-security-risks-in-the-cloud-ecosystem-atlassian-jira-emerging-security-risks-in-cloud-platforms\/","title":{"rendered":"Atlassian Jira: Emerging security risks in the Cloud Ecosystem (Atlassian Jira: Emerging security risks in Cloud platforms)"},"content":{"rendered":"<p><span style=\"font-weight: 400;font-size: 12pt;font-family: arial, helvetica, sans-serif\">In recent years, Software-as-a-Service (SaaS) platforms have increasingly become attractive targets for cybercriminals. A sophisticated spam campaign has recently emerged, exploiting Atlassian Jira Cloud to distribute phishing emails targeting government agencies and enterprises. This campaign leverages the inherent trust placed in widely used collaboration tools, highlighting how legitimate platform features can be abused to bypass traditional email security defenses.<\/span><\/p>\n<h2><span style=\"font-size: 12pt;font-family: arial, helvetica, sans-serif\"><b>Detailed findings<\/b><\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><span style=\"font-size: 12pt\"><span style=\"font-weight: 400\">Attackers initiate the campaign by creating Atlassian Cloud accounts with randomly generated identities, enabling them to spin up multiple Jira Cloud trial instances without requiring domain own<\/span><\/span><span style=\"font-size: 12pt\"><span style=\"font-weight: 400\">ership verification.<\/span><\/span><span style=\"font-size: 12pt\"><span style=\"font-weight: 400\"><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/b748a18d-623b-4749-9035-0150b7e7382d-1773286545-1-1775547819.webp\"><img decoding=\"async\" class=\"size-full wp-image-24009 aligncenter\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/b748a18d-623b-4749-9035-0150b7e7382d-1773286545-1-1775547819.webp\" alt=\"B748a18d 623b 4749 9035 0150b7e7382d 1773286545 (1) 1775547819\" width=\"1054\" height=\"892\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/b748a18d-623b-4749-9035-0150b7e7382d-1773286545-1-1775547819.webp 1054w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/b748a18d-623b-4749-9035-0150b7e7382d-1773286545-1-1775547819-700x592.webp 700w\" sizes=\"(max-width: 1054px) 100vw, 1054px\" \/><\/a><\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: 12pt;font-family: arial, helvetica, sans-serif\"><span style=\"font-weight: 400\">This approach allows attackers to operate with minimal traceability. Instead of relying on bulk user invitations via CSV\u2014an action that could raise suspicion\u2014they<\/span><span style=\"font-weight: 400\"> exploit the automation capabilities of Jira Automation capabilities<\/span><span style=\"font-weight: 400\"> (exploit the capabilities of Jira Automation) and distribute customized phishing emails.<\/span><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/e1a2047a-97e5-496c-9437-b4d499d05367-1773286593-1775547818.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24008\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/e1a2047a-97e5-496c-9437-b4d499d05367-1773286593-1775547818.png\" alt=\"E1a2047a 97e5 496c 9437 B4d499d05367 1773286593 1775547818\" width=\"1100\" height=\"516\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/e1a2047a-97e5-496c-9437-b4d499d05367-1773286593-1775547818.png 1100w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/e1a2047a-97e5-496c-9437-b4d499d05367-1773286593-1775547818-700x328.png 700w\" sizes=\"(max-width: 1100px) 100vw, 1100px\" \/><\/a><\/span><\/p>\n<p><span style=\"font-size: 12pt;font-family: arial, helvetica, sans-serif\"><span style=\"font-weight: 400\">These emails are sent from the <\/span><a href=\"https:\/\/www.atlassian.com\/software\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400\">atlassian.net<\/span><\/a><span style=\"font-weight: 400\"> domain\u2014a highly reputable source that strictly complies with authentication standards such as SPF and DKIM\u2014allowing them to bypass spam filters in most email systems with ease. The content is carefully localized and tailored to specific targets, such a<\/span><span style=\"font-weight: 400\">s highly skilled individuals of Russian origin living and working abroad<\/span><\/span><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt;font-family: arial, helvetica, sans-serif\">Victims are typically lured to phishing websites linked to fraudulent investment schemes or online casinos. In many cases, attackers leverage Keitaro TDS (Traffic Direction System) to intelligently route traffic, ensuring targets are redirected to the most convincing malicious destinations.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt;font-family: arial, helvetica, sans-serif\">The campaign ran from late December 2025 through the end of January 2026, primarily targeting organizations that rely heavily on Jira and handle email communications. While financial gain appears to be the primary objective, the level of targeting suggests that additional motives may be at play.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt;font-family: arial, helvetica, sans-serif\">Most email security systems rely heavily on sender-based evaluation\u2014checking SPF, DKIM, and DNS reputation to classify spam or phishing attempts. However, this campaign exposes critical weaknesses in that approach:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-size: 12pt;font-family: arial, helvetica, sans-serif\">Emails are sent through Atlassian\u2019s legitimate infrastructure \u2192 inherently trusted<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-size: 12pt;font-family: arial, helvetica, sans-serif\">SPF and DKIM validation pass successfully \u2192 no spam alerts triggered<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-size: 12pt;font-family: arial, helvetica, sans-serif\">Sending IPs match commonly used Jira Cloud services \u2192 not flagged by blacklists<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;font-size: 12pt;font-family: arial, helvetica, sans-serif\">As a result, traditional email security filters prove significantly less effective against this type of sophisticated phishing attack.<\/span><\/p>\n<h2><\/h2>\n<h2><span style=\"font-size: 12pt;font-family: arial, helvetica, sans-serif\"><b>Recommendations<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-size: 12pt;font-family: arial, helvetica, sans-serif\">Based on the analysis above, FPT Threat Intelligence proposes the following measures to mitigate risks:<\/span><\/p>\n<p><span style=\"font-size: 12pt;font-family: arial, helvetica, sans-serif\"><b>Monitor abnormal Jira activity<\/b><\/span><\/p>\n<p><span style=\"font-size: 12pt;font-family: arial, helvetica, sans-serif\"><span style=\"font-weight: 400\">Closely track the creation of unusual automation rules or newly registered Jira Cloud instances from unverified sources. Pay special attention to emails from <\/span><a href=\"https:\/\/www.atlassian.com\/software\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400\">atlassian.net<\/span><\/a><span style=\"font-weight: 400\">, particularly those containing suspicious links or requesting unusual actions.<\/span><\/span><\/p>\n<p><span style=\"font-size: 12pt;font-family: arial, helvetica, sans-serif\"><b>Reconfigure email gateways and filtering<\/b><\/span><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt;font-family: arial, helvetica, sans-serif\">Establish alerts for Jira-related emails originating from outside the internal network, especially from instances that are not on trusted allowlists.<\/span><\/p>\n<p><span style=\"font-size: 12pt;font-family: arial, helvetica, sans-serif\"><b>Enhance user awareness<\/b><\/span><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt;font-family: arial, helvetica, sans-serif\">Educate users about the risks of legitimate platforms being abused for malicious purposes. Encourage the adoption of multi-factor authentication (MFA) across all SaaS accounts.<\/span><\/p>\n<p><span style=\"font-size: 12pt;font-family: arial, helvetica, sans-serif\"><b>Adopt advanced security solutions<\/b><\/span><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt;font-family: arial, helvetica, sans-serif\">Consider deploying advanced AI\/ML-based security tools capable of detecting anomalous email patterns\u2014even when messages successfully pass SPF and DKIM authentication.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-size: 12pt;font-family: arial, helvetica, sans-serif\"><b>References<\/b><\/span><\/h2>\n<p><span style=\"font-size: 12pt;font-family: arial, helvetica, sans-serif\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/26\/b\/spam-campaign-abuses-atlassian-jira.html\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400\">Spam Campaign Abuses Atlassian Jira, Targets Government and Corporate Entities<\/span><\/a><\/span><\/p>\n<p><span style=\"font-size: 12pt;font-family: arial, helvetica, sans-serif\"><a href=\"https:\/\/www.cryptika.com\/cybercriminals-leverage-atlassian-cloud-for-spam-campaigns-redirecting-targets-to-fraudulent-investment-schemes\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400\">Cybercriminals Leverage Atlassian Cloud for Spam Campaigns Redirecting Targets to Fraudulent Investment Schemes<\/span><\/a><\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-size: 12pt;font-family: arial, helvetica, sans-serif\"><b>This article is an exclusive contribution by an expert from FPT IS, FPT Corporation.<\/b><b><i>Nguyen Van Trung<\/i><\/b><\/span><\/p>\n<p><span style=\"font-size: 12pt;font-family: arial, helvetica, sans-serif\"><b><i><br \/>\n<\/i><\/b><i><span style=\"font-weight: 400\"> FPT Information Security Center, FPT IS, FPT Corp<\/span><\/i><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"author":21,"featured_media":24018,"parent":0,"template":"","nang_luc":[],"danh_muc_goc_nhin_so":[],"dich_vu":[],"linh_vuc":[],"platform":[],"san_pham":[],"the_goc_nhin_so":[],"class_list":["post-24004","goc_nhin_so","type-goc_nhin_so","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/goc_nhin_so\/24004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/goc_nhin_so"}],"about":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/types\/goc_nhin_so"}],"author":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/users\/21"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/media\/24018"}],"wp:attachment":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/media?parent=24004"}],"wp:term":[{"taxonomy":"nang_luc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/nang_luc?post=24004"},{"taxonomy":"danh_muc_goc_nhin_so","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/danh_muc_goc_nhin_so?post=24004"},{"taxonomy":"dich_vu","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/dich_vu?post=24004"},{"taxonomy":"linh_vuc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/linh_vuc?post=24004"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/platform?post=24004"},{"taxonomy":"san_pham","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/san_pham?post=24004"},{"taxonomy":"the_goc_nhin_so","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/the_goc_nhin_so?post=24004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}