Security researchers have uncovered a large-scale phishing campaign that cleverly weaponizes the notification system of Atlassian Jira. Threat actors are abusing the trusted nature of this widely used project management tool to bypass email security controls and deliver malicious payloads to government and corporate entities globally. The attack involves the actor using a legitimate Jira instance to generate project invitations or comments, which in turn send notification emails from Atlassian's authentic servers. Because these emails are legitimate, they pass SPF/DKIM/DMARC checks and are delivered to users' inboxes, appearing as a trustworthy business communication. The goal of this 'digital Trojan Horse' campaign is credential harvesting and malware delivery.
The campaign's methodology is simple yet highly effective. It exploits the inherent trust that both email security systems and human users place in notifications from major SaaS platforms.
atlassian.net domain, is signed with a valid DKIM signature, and passes all standard email authentication checks.This 'low and slow' attack is difficult to detect with traditional methods because it doesn't involve spoofed domains or suspicious email headers.
T1566.002 - Spearphishing Link: The core of the attack is delivering a malicious link to the user.T1136 - Create Account: Attackers may create accounts on public-facing Jira instances to stage their attacks.T1078 - Valid Accounts: If an existing Jira instance is compromised, the attackers use valid accounts to create the malicious tickets.T1204.002 - Malicious Link: The attack relies on the user's execution by clicking the link in the trusted email.The abuse of trusted SaaS platforms for phishing has a significant impact:
D3-UA - URL Analysis.D3-ACH - Application Configuration Hardening.The primary defense is training users to be skeptical of unexpected notifications, even from trusted sources.
Use email security gateways with URL rewriting and time-of-click analysis to inspect the final destination of links.
Mapped D3FEND Techniques:
Harden the configuration of your own Jira instance to prevent abuse, such as restricting public projects.
Mapped D3FEND Techniques:
To combat this evasive technique, organizations must move beyond simple domain reputation and implement advanced URL Analysis at the email gateway. This involves using a 'URL rewrite' or 'time-of-click protection' feature. When an email from Jira arrives, the security service rewrites the link to pass through a proxy. When the user clicks it, the proxy analyzes the destination page in real-time for malicious content (like a credential harvesting form) before allowing the user to connect. This dynamic analysis is crucial because the initial email from Atlassian is benign; the threat lies in the destination of the link, which this technique directly addresses.
Organizations using Jira must harden their own instance's configuration to prevent it from being used as a weapon. This includes several key steps: 1) Disable anonymous access to all projects. 2) Severely restrict the ability for users to create public-facing projects. 3) Limit the ability to invite external collaborators to a small, trusted group of administrators. 4) Enforce mandatory MFA for all Jira accounts. By hardening their own application configuration, companies can prevent their own infrastructure from being abused in this type of attack and reduce their overall attack surface.
A proactive defense involves user training focused on this specific threat. Security teams should run internal phishing simulations that mimic this exact TTP. Create a test Jira project and send unexpected 'invitations' to employees. Track who clicks the link and provide immediate, context-aware training explaining the tactic. This builds muscle memory and a healthy sense of skepticism towards all unexpected notifications, regardless of the source. This is a form of creating a 'decoy' interaction to test and train user responses, making them a more effective human sensor in the defense-in-depth strategy.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats