{"id":24730,"date":"2024-06-21T00:10:07","date_gmt":"2024-06-21T08:10:07","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/06\/21\/news-18460\/"},"modified":"2024-06-21T00:10:07","modified_gmt":"2024-06-21T08:10:07","slug":"news-18460","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/06\/21\/news-18460\/","title":{"rendered":"Was T-Mobile compromised by a zero-day in Jira?"},"content":{"rendered":"\n<p>A moderator of the notorious data breach trading platform BreachForums is offering data for sale they claim comes from a data breach at T-Mobile.<\/p>\n<p>The moderator, going by the name of IntelBroker, describes the data as containing source code, SQL files, images, Terraform data, t-mobile.com certifications, and &#8220;Siloprograms.&#8221; (We&#8217;ve not heard of siloprograms, and can&#8217;t find a reference to them anywhere, so perhaps it&#8217;s a mistranslation or typo.)<\/p>\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" width=\"1252\" height=\"777\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/06\/For_sale.jpg\" alt=\"post offereing data for sale supposedly from a T-Mobile internal breach\" class=\"wp-image-112401\" style=\"width:700px\" \/><figcaption class=\"wp-element-caption\">Post offereing data for sale supposedly from a T-Mobile internal breach<\/figcaption><\/figure>\n<p>To prove they had the data, IntelBroker posted several screenshots showing access with administrative privileges to a Confluence server and T-Mobile&#8217;s internal Slack channels for developers.<\/p>\n<p>But according to sources known to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/t-mobile-denies-it-was-hacked-links-leaked-data-to-vendor-breach\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">BleepingComputer<\/a>, the data shared by IntelBroker actually consists of older screenshots. These screenshots show T-Mobile&#8217;s infrastructure, posted at a known\u2014yet unnamed\u2014third-party vendor&#8217;s servers, from where they were stolen.<\/p>\n<p>When we looked at the screenshots IntelBroker attached to their post, we spotted something interesting in one of them.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"978\" height=\"270\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/06\/CVE-2024-1597.jpg\" alt=\"search for vulnerability\" class=\"wp-image-112402\" \/><figcaption class=\"wp-element-caption\">Found CVE-2024-1597<\/figcaption><\/figure>\n<p>This screenshot shows a search query for a critical vulnerability in Jira, a project management tool used by teams to plan, track, release and support software. It&#8217;s typically a place where you could find the source code of works in progress.<\/p>\n<p>The search returns the result <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-1597\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-1597<\/a>, a SQL injection vulnerability. SQL injection happens when a cybercriminal injects malicious SQL code into a form on a website, such as a login page, instead of the data the form is asking for. The vulnerability affects Confluence Data Center and Server according to <a href=\"https:\/\/confluence.atlassian.com\/security\/security-bulletin-may-21-2024-1387867145.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Atlassian\u2019s May security bulletin<\/a>.<\/p>\n<p>For a better understanding, it\u2019s important to note that Jira and Confluence are both products created by Atlassian, where Jira is the project management and issue tracking tool and Confluence is the collaboration and documentation tool. They are often used together.<\/p>\n<p>If IntelBroker has a working exploit for the SQL injection vulnerability, this could also explain their claim that they have <a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2024\/06\/20\/has-apple-been-hacked-hacker-claims-june-2024-breach-exposes-source-code\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">the source code of three internal tools used at Apple<\/a>, including a single sign-on authentication system known as AppleConnect.<\/p>\n<p>This theory is supported by the fact that IntelBroker is also offering a Jira zero-day for sale.<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1043\" height=\"254\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/06\/JIra_exploit_redacted.jpg?w=1024\" alt=\"IntelBroker offering zero-day for JIra for sale\" class=\"wp-image-112405\" \/><figcaption class=\"wp-element-caption\">IntelBroker selling zero-day for JIra<\/figcaption><\/figure>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cI&#8217;m selling a zero-day RCE for Atlassian&#8217;s Jira.<\/p>\n<p>Works for the latest version of the desktop app, as well as Jira with confluence.<\/p>\n<p>No login is required for this, and works with Okta SSO.\u201d<\/p>\n<\/blockquote>\n<p>If this is true then this exploit, or its fruits, might be used for data breaches that involve personal data. <\/p>\n<p>Meanwhile, T-Mobile has denied it has suffered a breach, saying it is investigating whether there has been a breach at a third-party provider.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cWe have no indication that T-Mobile customer data or source code was included and can confirm that the bad actor&#8217;s claim that T-Mobile&#8217;s infrastructure was accessed is false.&#8221;<\/p>\n<\/blockquote>\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n<p><strong>We don&#8217;t just report on threats &#8211; we help safeguard your entire digital identit<\/strong>y<\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Protect your\u2014and your family&#8217;s\u2014personal information by using <a href=\"https:\/\/www.malwarebytes.com\/identity-theft-protection\">identity protection<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/06\/was-t-mobile-compromised-by-a-zero-day-in-jira\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> IntelBroker is offering source code from major companies for sale. Are they demonstrating the value of a zero-day they are also selling? <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[2211,31567,31568,32,5897,13197],"class_list":["post-24730","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-apple","tag-intelbroker","tag-jira","tag-news","tag-privacy","tag-t-mobile"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24730"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24730\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}