Exposed JIRA service desks grant access to organizations' internal operations

Internal ticketing tool Atlassian JIRA’s unsecured service desks were publicly exposed, allowing attackers to raise internal tickets.

Share this Intel:

In an attempt to fight the spread of Coronavirus, Governments are carrying out social distancing measures with the cooperation of its citizens, local agencies, and businesses. With remote work becoming the new normal, companies are setting up tools and processes to facilitate to ensure their business is not affected by the crisis. 

This has led to the unprecedented adoption and usage of Project management and internal ticketing tools such as Atlassian JIRA and Asana. However, it was recently found that several of Atlassian JIRA’s internal service desks were found publicly exposed and attackers were able to retool them to act as internal service ticket portals. The following Google dork compiles the list of open JIRA service desks:

site:atlassian.net AND “Enter your e-mail address and we will send you a private sign up link”

List of open JIRA service desks on Google
List of open JIRA service desks on Google

This allows attackers to sign up as employees and raise legitimate internal requests. 

JIRA sign up page that only requires user email id
JIRA sign up page that only requires user email id

Since all internal requests are not authenticated, attackers take advantage of the situation to set up projects for multiple departments such as IT, Finance, Legal, HR, etc. This provides 

the attackers a leeway to access to users’ email addresses, employee information, customer details, social media channels and internal tools. It also allows them to make changes to online assets, request salary changes, and even request for access badges to the company’s office premises. 

So, if you are working remotely, ensure all your project management, ticketing, and collaboration tools are secure. 

Be informed about these Threats in your Inbox

Sign up now to our Threat intelligence Newsletter and be the first to know about these threats first in your inbox.