Cybercriminals Leverage Atlassian Cloud for Spam Campaigns Redirecting Targets to Fraudulent Investment Schemes
Cybercriminals have launched a sophisticated spam campaign leveraging the trusted infrastructure of Atlassian Cloud.
By abusing legitimate features within the platform, attackers are effectively bypassing traditional email security controls to reach high-value targets.
This campaign focuses on redirecting users to fraudulent investment schemes, utilizing the inherent trust associated with well-known software-as-a-service providers to deceive recipients.
The attacks are highly targeted, focusing on government and corporate entities across various regions, including English, French, German, Italian, Portuguese, and Russian-speaking demographics.
Instead of generic spam, these messages are tailored to specific language groups. The ultimate goal is to funnel traffic to malicious landing pages via Keitaro TDS, generating revenue through scams and illicit advertising.
Trend Micro researchers identified that this activity became prominent between late December 2025 and January 2026.
By operating through established cloud services with strong domain reputations, the attackers ensure their emails pass standard authentication checks like Sender Policy Framework and DomainKeys Identified Mail.
This makes detection significantly harder for conventional security filters, which typically prioritize notifications from reputable SaaS platforms.
The campaign demonstrates a high level of automation, allowing threat actors to rapidly scale their operations.
They create multiple Atlassian instances to distribute their messages, ensuring that even if one instance is blocked, others continue to function.
One of the final landing pages of the spam campaign (Source – Trend Micro)
This resilience highlights the evolving tactics of modern cybercriminals who weaponize legitimate tools to conduct malicious activities without triggering immediate alarms.
Mechanism of Infrastructure Abuse
The core of this campaign lies in the ease with which threat actors can provision disposable infrastructure to facilitate their attacks.
Attackers initiate the process by creating Atlassian Cloud accounts using randomized naming conventions, enabling them to generate numerous Jira Cloud instances without requiring domain ownership verification.
Creating a trial Jira instance (Source – Trend Micro)
These instances resolve to legitimate AWS IP addresses shared by valid deployments, further masking the malicious nature of the activity. Attackers rely on the inherent trust of Atlassian-generated emails rather than reinforcing legitimacy through domain registration.
Once the infrastructure is in place, the attackers utilize Jira Automation to construct and send crafted emails.
Jira Kanban Board allows for the creation of automation rules (Source – Trend Micro)
This method allows them to deliver messages directly through Atlassian’s integrated email system, avoiding the need for their own mail servers.
The recipients do not need to be listed users within the instance, permitting widespread distribution without exposing the attacker’s true identity or infrastructure.
Breakdown of targets by industry (Source – Trend Micro)
Organizations should reassess their trust assumptions regarding third-party cloud-generated emails to prevent such abuses. Security teams are advised to deploy advanced email security solutions that provide layered detection and identity-aware controls.
These measures are essential to identify and block phishing attempts that exploit trusted SaaS platforms. Additionally, monitoring for indicators of compromise, such as specific URL patterns and redirect chains, can help mitigate these threats effectively.
Follow us on Google News , LinkedIn , and X to Get More Instant Updates , Set CSN as a Preferred Source in Google .
The post Cybercriminals Leverage Atlassian Cloud for Spam Campaigns Redirecting Targets to Fraudulent Investment Schemes appeared first on Cyber Security News .
Cybercriminals Leverage Atlassian Cloud for Spam Campaigns Redirecting Targets to Fraudulent Investment Schemes
18.02.2026 03:44 — 👍 1 🔁 2 💬 0 📌 0
Breaking news: Officials released new photos in their investigation of Nancy Guthrie’s disappearance, which they say were recovered recently from “backend systems” with the help of private companies. https://wapo.st/4aaKUCj
10.02.2026 19:16 — 👍 38 🔁 10 💬 8 📌 1
The right wants so bad to be in the Hollywood “in” crowd but they pretend they don’t. Thats why they’re desperate for their Super Bowl show to not suck like it did
09.02.2026 04:02 — 👍 3329 🔁 679 💬 280 📌 77
THIS 👇 IS TRUE.......
07.02.2026 10:05 — 👍 7136 🔁 1820 💬 327 📌 132
The Artemis II astronauts could fly farther into space than any humans ever before. cbsn.ws/3Zchr4A
02.02.2026 00:35 — 👍 30 🔁 5 💬 5 📌 3
There have been so many ICE arrests around Downtown Los Angeles, blocks from City Hall and the Kenneth Hahn Hall of Administration. This is LITERALLY RIGHT NEXT TO BOTH!
It's absolutely insane that city and county officials are not intervening when this is happening at their doorsteps.
30.01.2026 20:04 — 👍 69 🔁 38 💬 2 📌 3
Walz: I think Kristi Noem probably should go back to South Dakota, not have any dogs, and just kind of ride things out
27.01.2026 20:20 — 👍 37269 🔁 7658 💬 1776 📌 621
Europe pushed back on Greenland, but Americans did too. The public, the markets, even some GOP senators spoke up. And Trump backed down. We don't live in a monarchy, we don't live in a dictatorship, and Trump won't be in power forever. Clip from my conversation on The Court of History podcast
28.01.2026 18:31 — 👍 128 🔁 33 💬 2 📌 1
Ian Austin, an Army veteran, was arrested for protesting ICE in Minneapolis. But he’s continued protesting. Senior reporter @julialurie.bsky.social spoke to him.
“When they say, ‘Why would you be out here?’ How the fuck could I not be out here?” he says. “My nation is under attack."
27.01.2026 17:30 — 👍 23706 🔁 9533 💬 657 📌 709
It's clarifying to see these chodes with their masks down, asses out for the world to see, and as the irredeemable incel losers that they truly are
28.01.2026 03:20 — 👍 8393 🔁 2042 💬 638 📌 129
REPUBLICAN @SenThomTillis rips Noem & Stephen Miller — He says @KristiNoem is ignoring her job and the Trump regime isn’t helping Americans with disaster relief, and Stephen Miller “never fails to live up to my expectations of incompetence”
(From CNN)
28.01.2026 03:32 — 👍 3928 🔁 1186 💬 275 📌 110
Terrorist attack in Minnesota:
A Trump Zio MAGA attacked US Rep. Ilhan Omar ( @IlhanMN ), the terrorist sprayed her with an unknown substance and was quickly taken down by security. The terrorist timed the attack at the mention of Trump’s ICE paramilitary force. #3E #GoodVsEvil
28.01.2026 02:16 — 👍 1106 🔁 365 💬 88 📌 46
Man attacking Minnesota rep
A MAGA terrorist at a town hall hosted by Ilhan Omar lunged at her & sprayed her with an unknown substance
Security urged Omar to leave the room & “get checked,” but she said that “is what they want.”
"We will continue," she said. "These fucking assholes are not going to get away with this.”
28.01.2026 01:54 — 👍 78 🔁 28 💬 13 📌 3
“He’s killing us in the streets and we still have to pay our taxes in April” is an incredibly compelling point.
26.01.2026 00:40 — 👍 7477 🔁 2200 💬 14 📌 0
‘SyncFuture’ Campaign Weaponizing Legitimate Enterprise Security Software to Deploy Malware
In December 2025, threat researchers uncovered an alarming espionage operation targeting residents of India through sophisticated phishing campaigns.
The attack, dubbed SyncFuture, demonstrates how cybercriminals can abuse legitimate business software as a vehicle for launching advanced malware attacks.
Attackers sent fraudulent emails impersonating India’s Income Tax Department, tricking victims into downloading malicious files containing multiple stages of malicious code.
The infection chain reveals remarkable technical sophistication. Victims who opened the files received a ZIP archive containing what appeared to be a government document review tool.
Attack Flow (Source – Esentire)
Instead, the archive held a weaponized executable that would begin a multi-stage attack sequence designed to gain complete control over infected computers and maintain long-term access.
eSentire analysts and researchers identified this campaign and documented how it combines multiple attack techniques to evade security defenses and establish persistent access.
Phishing email impersonating Government of India Tax Penalty notice (Source – Esentire)
The threat actors employed legitimate Microsoft-signed binaries, automated evasion tactics, and ultimately repurposed a genuine enterprise management platform as their final payload—a particularly troubling indicator of the campaign’s sophistication and resources.
Avast Antivirus Evasion Through Automated Mouse Simulation
The SyncFuture campaign demonstrates advanced detection evasion tactics, particularly targeting Avast Free Antivirus through a technique most wouldn’t expect from automated malware.
When the malware detected Avast running on a victim’s machine, it deployed an innovative approach: simulating mouse movements and clicks to navigate Avast’s interface automatically.
Similar themed phishing web page also impersonating Government of India tax document (Source – Esentire)
This technique is noteworthy because it shows attackers studying specific antivirus products in detail.
The malware would locate the Avast detection dialog window, then programmatically move the cursor to hardcoded screen coordinates and click on options that create security exceptions.
By simulating human-like user actions rather than attempting to disable the antivirus entirely, the malware successfully added itself to Avast’s exclusion list, effectively whitelisting the malicious files.
Invalid Digital Signature of game-float-core.dll (Source – Esentire)
This persistence mechanism allowed the threat actor’s tools to operate undetected by the antivirus software.
The batch scripts analyzed contained conditional logic specifically checking whether Avast was running, demonstrating that attackers had thoroughly tested and customized their malware for different antivirus environments.
This infection mechanism represents a significant evolution in malware sophistication—moving beyond simple evasion toward targeted manipulation of specific security products to achieve their long-term espionage objectives.
Follow us on Google News , LinkedIn , and X to Get More Instant Updates , Set CSN as a Preferred Source in Google .
The post ‘SyncFuture’ Campaign Weaponizing Legitimate Enterprise Security Software to Deploy Malware appeared first on Cyber Security News .
‘SyncFuture’ Campaign Weaponizing Legitimate Enterprise Security Software to Deploy Malware
26.01.2026 10:27 — 👍 2 🔁 1 💬 0 📌 0
This video contains graphic imagery. Eyewitness video shows a US Border Patrol agent shooting and killing a man in Minneapolis on January 24.
26.01.2026 02:09 — 👍 211 🔁 98 💬 33 📌 11
Kudos to the NYT editor who took “Appears to” out of the lead headline (finally)
25.01.2026 15:18 — 👍 9825 🔁 1957 💬 188 📌 104
Federal agents in Minneapolis wrestled Alex Pretti to the ground and secured the handgun he was carrying moments before shooting him multiple times, according to a Washington Post analysis of video footage.
Read more: https://wapo.st/4qGOx8M
25.01.2026 14:38 — 👍 1665 🔁 786 💬 159 📌 123
Sorry for posting this, because it's disturbing, but it is important that we can all see this crucial moment. There is no disputing this order of events:
Pretti was disarmed (of the holstered weapon that he had a permit to carry).
And THEN he was murdered by ICE.
25.01.2026 15:23 — 👍 72 🔁 17 💬 2 📌 0
Left hand on the ground trying not to hit the pavement; right hand still holding a cell phone. ICE person standing with a one handed grip pointing his gun right at the man’s head.
There is nothing about this that we should accept. We all must reject this. This is our government, & they want this
25.01.2026 15:25 — 👍 1499 🔁 552 💬 43 📌 42
YouTube video by Bellingcat
Analysis of Alex Pretti Shooting in Minneapolis
We just posted a quick analysis of the shooting of Alex Pretti in Mineapolis. Watch it here: www.youtube.com/watch?v=LkFc...
24.01.2026 23:35 — 👍 532 🔁 287 💬 18 📌 31
Statement from Alex Pretti’s parents.
Matches up with this Statement from his parents about their hero son.
25.01.2026 02:04 — 👍 259 🔁 95 💬 2 📌 3
A PHOTO OF ALEX PRETTI
WITH THE WORDS:
MURDERED FOR STANDING
UP FOR WHAT IS RIGHT.
A VA nurse who dedicated his life to helping others, murdered by a man who has dedicated his life to hurting others.
25.01.2026 01:41 — 👍 760 🔁 223 💬 7 📌 7
https://williamzafravelasco.tumblr.com/
News for the 99%. ON-THE-GROUND and investigative reporting on the stories corporate media COVERS UP | https://statuscoup.com/join
Independent journalist, SnapStream brand ambassador, and publisher of the Public Notice newsletter https://www.publicnotice.co/subscribe
Not a Nazi... and not SPAM(Appealing).
I'm New Greg from The Good Place and I like stuff you probably like. I like to stand up to bullies. Again, not a Nazi. No way you say? ...WAY.
Joking aside... 95% of these posts are super cereal.
The fastest growing independent news network in the world. We cover breaking news, politics, law and more. We are unapologetically pro-democracy.
“Fucking bitch” and Native America artist…a good Chief gives they do not take ……..
I write about basketball. And watch movies. Senior Writer at
@TheAthletic on the NBA/NBA Draft. Host of the Game Theory Podcast. Email: sam.vecenie@gmail.com
Tech Sense delivers quick and reliable global technology news, AI updates, gadgets, cybersecurity, space tech, and digital trends — with insights from public reports and platforms like 1Tak (1tak.com).
👨🎨🍵🍷🪬🔭🗺️🛶🎨🎭🎬📸🎞️📚💙 DM’s don’t work ; AOC 2028
https://www.luxsea.art
Foreign Affairs Journalist | ONEST, Founder
Global News(letter) (Mon-Thu, Sat)
https://onest.substack.com
Deep Dives, ONEST Explains
Articles (Fri): onestnetwork.com
Videos (Sat): youtube.com/@onestnetwork
Join as member: onestnetwork.com/support
Editor and CEO, Zeteo
Author, ‘Win Every Argument’
British-American
Senior Intern @ the Shadowserver Foundation | OT/IT DFIR | Threat Intel | Malware | Pentesting | Volunteer @ VXUG | Malpedia Contributor | D33P_DIV3R@infosec.exchange
👨💻APT Insights
🕵️♂️Tracking Cyber-Espionage Threats
💻Uncovering the Dark Side of the Digital World
👇Latest Threat Analysis & Updates
https://malwhere.substack.com/
Offensive Security Professional | Phillip Wylie Show Podcast Host | The Pentester Blueprint coauthor | TribeOfHackers Red Team | https://linktr.ee/phillipwylie
☆ Cybersecurity reporter
★ Newsletters at Risky Business
#infosec #cybersecurity
https://risky.biz
Threat hunter | Malware nerd
🇵🇷🪖👾
You know why you're here if you're here. Also, https://packetstorm.news/ feeds.
A Detection Engineering and Threat Hunting workshop-first conference for cybersecurity pros, students, and enthusiasts.
Held online and in many small venues around the world.
We are leaders in Open-Source Intelligence training and software, globally. #OSINT
Find us at osintcombine.com