Attackers Abuse Atlassian Jira Notifications in Large-Scale Phishing Campaign to Bypass Email Filters

Large-Scale Phishing Campaign Abuses Atlassian Jira Notification System as a 'Digital Trojan Horse'

HIGH
February 18, 2026
4m read
PhishingCyberattackCloud Security

Related Entities

Organizations

Products & Tech

Jira

Full Report

Executive Summary

Security researchers have uncovered a large-scale phishing campaign that cleverly weaponizes the notification system of Atlassian Jira. Threat actors are abusing the trusted nature of this widely used project management tool to bypass email security controls and deliver malicious payloads to government and corporate entities globally. The attack involves the actor using a legitimate Jira instance to generate project invitations or comments, which in turn send notification emails from Atlassian's authentic servers. Because these emails are legitimate, they pass SPF/DKIM/DMARC checks and are delivered to users' inboxes, appearing as a trustworthy business communication. The goal of this 'digital Trojan Horse' campaign is credential harvesting and malware delivery.


Threat Overview

The campaign's methodology is simple yet highly effective. It exploits the inherent trust that both email security systems and human users place in notifications from major SaaS platforms.

  1. Setup: The attackers gain control of a legitimate Jira instance, either by compromising an existing one or creating their own.
  2. Lure Generation: They create a new Jira project or comment on an existing ticket, crafting the content to be enticing. For example, the ticket might be titled 'Urgent Document Review' or 'Q1 Bonus Information'.
  3. Weaponized Invitation: The attacker then uses Jira's built-in functionality to 'invite' or 'mention' the target's email address in the ticket.
  4. Trusted Delivery: Atlassian's infrastructure automatically generates and sends a notification email to the target. This email originates from a legitimate atlassian.net domain, is signed with a valid DKIM signature, and passes all standard email authentication checks.
  5. Execution: The user receives what appears to be a legitimate Jira notification. They click the link to 'view the task,' which directs them to a credential harvesting page or a site that drops malware.

This 'low and slow' attack is difficult to detect with traditional methods because it doesn't involve spoofed domains or suspicious email headers.

Technical Analysis

MITRE ATT&CK TTPs

Impact Assessment

The abuse of trusted SaaS platforms for phishing has a significant impact:

  • High Success Rate: Because the emails bypass technical filters and appear legitimate, users are far more likely to click the malicious links.
  • Credential Theft: The primary goal is often to steal corporate credentials, which can then be used for business email compromise (BEC), ransomware deployment, or further network intrusion.
  • Malware Delivery: The links can also lead to the download of malware, providing the attacker with a persistent foothold in the target's network.
  • Detection Evasion: The campaign is difficult for security teams to block at the network perimeter, shifting the burden of detection onto endpoint and user behavior analysis.

Detection & Response

  • Link Analysis: Utilize email security solutions with advanced URL analysis capabilities that can scan the final destination of links, even those originating from trusted sources like Atlassian. This is a form of D3FEND's D3-UA - URL Analysis.
  • User Training: This is the most critical defense. Train users to be suspicious of unexpected notifications, even from trusted services. They should ask themselves, 'Was I expecting to be added to a Jira project?' and verify unexpected requests out-of-band.
  • Jira Configuration Review: For organizations using Jira, review public-facing project settings. Disable anonymous access and consider restricting who can create new projects or invite external users.
  • Browser Isolation: Use remote browser isolation (RBI) technology to open links from external emails in a sandboxed environment, preventing any malicious code from reaching the user's endpoint.

Mitigation

  • Enhanced User Awareness: Go beyond standard phishing training. Specifically educate users on the tactic of abusing trusted SaaS platforms like Jira, SharePoint, and Google Docs. Teach them to hover over links to see the true destination and to be wary of any unexpected request for action.
  • Application Hardening: For your own Jira instance, enforce MFA for all users. Restrict the ability to create public projects and invite external collaborators to a limited set of trusted administrators. This is an example of D3FEND's D3-ACH - Application Configuration Hardening.
  • Email Gateway Rules: While difficult, it may be possible to create custom email gateway rules that flag or quarantine Jira notifications related to projects or instances not affiliated with your organization. This requires careful rule tuning to avoid blocking legitimate communications.

Timeline of Events

1
February 18, 2026
Security researchers detail the ongoing phishing campaign abusing Atlassian Jira notifications.
2
February 18, 2026
This article was published

MITRE ATT&CK Mitigations

The primary defense is training users to be skeptical of unexpected notifications, even from trusted sources.

Use email security gateways with URL rewriting and time-of-click analysis to inspect the final destination of links.

Mapped D3FEND Techniques:

Harden the configuration of your own Jira instance to prevent abuse, such as restricting public projects.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To combat this evasive technique, organizations must move beyond simple domain reputation and implement advanced URL Analysis at the email gateway. This involves using a 'URL rewrite' or 'time-of-click protection' feature. When an email from Jira arrives, the security service rewrites the link to pass through a proxy. When the user clicks it, the proxy analyzes the destination page in real-time for malicious content (like a credential harvesting form) before allowing the user to connect. This dynamic analysis is crucial because the initial email from Atlassian is benign; the threat lies in the destination of the link, which this technique directly addresses.

Organizations using Jira must harden their own instance's configuration to prevent it from being used as a weapon. This includes several key steps: 1) Disable anonymous access to all projects. 2) Severely restrict the ability for users to create public-facing projects. 3) Limit the ability to invite external collaborators to a small, trusted group of administrators. 4) Enforce mandatory MFA for all Jira accounts. By hardening their own application configuration, companies can prevent their own infrastructure from being abused in this type of attack and reduce their overall attack surface.

A proactive defense involves user training focused on this specific threat. Security teams should run internal phishing simulations that mimic this exact TTP. Create a test Jira project and send unexpected 'invitations' to employees. Track who clicks the link and provide immediate, context-aware training explaining the tactic. This builds muscle memory and a healthy sense of skepticism towards all unexpected notifications, regardless of the source. This is a form of creating a 'decoy' interaction to test and train user responses, making them a more effective human sensor in the defense-in-depth strategy.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

PhishingAtlassianJiraSaaS SecurityCredential HarvestingEmail Security

📢 Share This Article

Help others stay informed about cybersecurity threats