Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cybercriminals Exploit Atlassian for Fraudulent Schemes

Cybercriminals Exploit Atlassian for Fraudulent Schemes

Posted on February 18, 2026 By CWS

Cybercriminals are leveraging Atlassian Cloud to orchestrate a sophisticated spam campaign targeting high-value entities. By exploiting legitimate features in the platform, attackers bypass conventional email security measures, directing users to fraudulent investment schemes.

Targeted Attacks Across Multiple Regions

This malicious campaign specifically targets government and corporate sectors in various linguistic regions such as English, French, and German. The emails are carefully tailored to these language groups, aiming to mislead recipients into visiting deceptive landing pages via Keitaro TDS, ultimately generating revenue through scams and illicit advertising.

Exploiting Trusted Infrastructure

Research from Trend Micro indicates that the campaign gained momentum between late December 2025 and January 2026. By utilizing reputable cloud services, the attackers ensure their emails pass authentication checks like Sender Policy Framework and DomainKeys Identified Mail, making detection challenging for traditional security filters that trust notifications from established SaaS platforms.

The campaign’s automation allows for rapid scaling, with multiple Atlassian instances created to distribute messages. This ensures continuity even if some instances are blocked, showcasing the adaptability and resourcefulness of modern cybercriminals.

Abusing Legitimate Features for Malicious Intent

The attackers’ strategy involves establishing disposable infrastructure through Atlassian Cloud accounts created with randomized names, enabling numerous Jira Cloud instances without domain verification. These instances utilize AWS IP addresses of legitimate deployments, further obscuring the malicious activity.

Using Jira Automation, attackers craft and send emails through Atlassian’s system, bypassing the need for personal mail servers. This allows for widespread message distribution without revealing the attackers’ identities or infrastructure.

Organizations must reevaluate their trust in third-party cloud-generated emails to prevent such abuses. Deploying advanced email security solutions and monitoring for indicators of compromise can help mitigate these threats. Security teams are encouraged to implement layered detection and identity-aware controls to better identify and block phishing attempts that exploit trusted platforms.

Cyber Security News Tags:Atlassian Cloud, cloud services, Cybersecurity, email security, fraudulent schemes, investment scams, phishing prevention, SaaS platforms, spam campaigns, Trend Micro

Post navigation

Previous Post: DigitStealer Malware Uncovers macOS System Vulnerabilities
Next Post: Dell Vulnerability Exploited by Chinese Hackers Since 2024

Related Posts

Anthropic Challenges U.S. ‘Supply Chain Risk’ Designation Anthropic Challenges U.S. ‘Supply Chain Risk’ Designation Cyber Security News
New Echo Chamber Attack Jailbreaks Most AI Models by Weaponizing Indirect References New Echo Chamber Attack Jailbreaks Most AI Models by Weaponizing Indirect References Cyber Security News
MongoBleed Detector Tool Released to Detect MongoDB Vulnerability(CVE-2025-14847) MongoBleed Detector Tool Released to Detect MongoDB Vulnerability(CVE-2025-14847) Cyber Security News
CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild Cyber Security News
Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System Cyber Security News
Amazon Catches North Korean IT Worker by Tracking Tiny 110ms Keystroke Delays Amazon Catches North Korean IT Worker by Tracking Tiny 110ms Keystroke Delays Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub
  • Fortinet Issues Patch for Critical FortiClient EMS Vulnerability
  • Progress ShareFile Flaws Risk Server Takeover
  • European Commission Data Breach from Trivy Attack Unveiled

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub
  • Fortinet Issues Patch for Critical FortiClient EMS Vulnerability
  • Progress ShareFile Flaws Risk Server Takeover
  • European Commission Data Breach from Trivy Attack Unveiled

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark