Cofense Logo - Email Security Solutions

Threat Actors Abuse Atlassian, Bypass Multiple Secure Email Gateways (SEGs)

Share Now


Found in Environments Protected By: 
Microsoft, Cisco Ironport, Proofpoint, Trend Micro 

By Brandon Cook, Cofense Phishing Defense Center

Threat actors are frequently trying to explore new ways they can take advantage of trusted services and organizations by using popular file-sharing services or abusing URL redirects for familiar websites. Recently, the Cofense Phishing Defense Center (PDC) has observed a phishing campaign, under the guise of a payment remittance, taking advantage of custom URLs from Atlassian to redirect users to their phish.

Email Body

Figure 1: Email Body 

In Figure 1, the threat actor uses the ‘SharePoint’ title to add confidence to the message with an attempt to make the body of this email appear to be more legitimate. By implying that a “Payment” is in progress, the recipient is more inclined to click on malicious URLs to investigate. Upon clicking the “Review Document” button, the recipient is directed to an Atlassian page, used by many organizations to collaborate, manage projects, share, etc.

Phishing Page

Figure 2: Phishing Page 

After clicking the link, the recipient will be redirected to the page in Figure 2, hosted on Atlassian. On the landing page there are blurred documents when you hover over a “Preview Document Here” button, directing the recipient to the final page of the phish.

Phishing Page 

Figure 3: Phishing Page 

Finally, the recipient has arrived at the landing page of the phish in Figure 3 where they are prompted to verify their identity by entering Microsoft credentials. This campaign uses a mixed bag of brands that don’t normally fit together, starting with SharePoint, Confluence, and now Microsoft and Google. After all the techniques used by the threat actor, this page is hosted on a Google Translate page.

Although this campaign may have seemed convincing at first by using popular logos and financial transactions it’s using a new, but quite familiar, organization to host their initial phishing page. The Cofense Phishing Defense Center (PDC) was able to detect the malicious intent and keep our clients secure from this attack. If you would like to learn more about the PDC, reach out to us

Indicators of CompromiseIP

All third-party trademarks referenced by Cofense whether in logo form, name form or product form, or otherwise, remain the property of their respective holders, and use of these trademarks in no way indicates any relationship between Cofense and the holders of the trademarks. Any observations contained in this blog regarding circumvention of end point protections are based on observations at a point in time based on a specific set of system configurations. Subsequent updates or different configurations may be effective at stopping these or similar threats. Past performance is not indicative of future results.

The Cofense® and PhishMe® names and logos, as well as any other Cofense product or service names or logos displayed on this blog are registered trademarks or trademarks of Cofense Inc.


We use our own and third-party cookies to enhance your experience by showing you relevant content, personalizing our communications with you, and remembering your preferences when you visit our website. We also use them to improve the overall performance of our site. You can learn more about the cookies and similar technology we use by viewing our privacy policy. By clicking ‘Accept,’ you acknowledge and consent to our use of all cookies on our website.

This site is registered on as a development site.