Atlassian Company Cyber Security Posture

atlassian.com

Atlassian powers the collaboration that helps teams accomplish what would otherwise be impossible alone. From space missions and motor racing to bugs in code and IT requests, no task is too large or too small with the right team, the right tools, and the right practices. Over 300,000 global companies and 80% of the Fortune 500 rely on Atlassianโ€™s software, like Jira, Confluence, Loom, and Trello, to help their teams work better together and deliver quality results on time. With our 300,000+ customers and team of 10,000+ Atlassians, we are building the next generation of team collaboration and productivity software. We believe the power of teams has the potential to change the worldโ€”one that is more open, authentic, and inclusive.

Atlassian Company Details

Linkedin ID:

atlassian

Employees number:

17274 employees

Number of followers:

1866259.0

NAICS:

511

Industry Type:

Software Development

Homepage:

atlassian.com

IP Addresses:

156

Company ID:

ATL_2964148

Scan Status:

In-progress

AI scoreAtlassian Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreAtlassian Global Score
blurone
Ailogo

Atlassian Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Atlassian Company Cyber Security News & History

Past Incidents
5
Attack Types
2
EntityTypeSeverityImpactSeenUrl IDDetailsView
AtlassianVulnerability100608/2021ATL0214622Link
Rankiteo Explanation :
Attack threatening the economy of a geographical region

Description: Atlassian discovered a vulnerability in its Confluence Server which they need to patch to remedy a Critical-rated flaw. Confluence Server Webwork OGNL injection vulnerability could allow an authenticated user, or unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance. However, Atlassian's own Confluence Cloud was patched but other hosted Confluence offerings might be vulnerable.

AtlassianVulnerability100506/2022ATL23554622Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Atlassian warned its customers that multiple threat groups are exploiting a Confluence Server zero-day vulnerability in its servers. Any unauthenticated attackers can target its Confluence Server and Data Center by a critical vulnerability that can be exploited for remote code execution. The company advised its users have been advised to prevent access to their Confluence servers from the internet, or simply disable these instances, as all supported versions of Confluence Server and Data Center are affected. However, Atlassian expects fixes to become available soon.

AtlassianData Leak60302/2023ATL195481023Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Atlassian reveals a data leak that was brought on by the theft of employee login information that was then utilized to obtain data from a third-party vendor. More than 13,200 entries make up the employee file that was uploaded online, and a brief inspection of the file suggests that it contains data on many current employees, including names, email addresses, work departments, and other details. The threat actors obtained information from a third-party vendor using the employee login credentials they had stolen. The business emphasized that the event had no impact on consumer or network data. The business acknowledged the data breach and disclosed that Envoy, a startup that offers workplace management services to the Australian software giant, was the source of the leaked data.

AtlassianData Leak50104/2017ATL116201123Link
Rankiteo Explanation :
Attack without any consequences

Description: Atlassian revealed that unidentified hackers gained access to a vast quantity of data from its group chat service HipChat by breaking into a cloud server owned by the business. Although Atlassian did not disclose the identity of the prominent third-party software library that was utilised by its HipChat.com service, the business claims that attackers took advantage of a weakness in the library. The business issued instructions on how to reset passwords to all users whose accounts were connected to HipChat and, as a precaution, invalidated the passwords on those accounts. The organisation claims that although hashed passwords, email addresses, and names were accessible to hackers, no financial information was revealed.

AtlassianVulnerability10058/2024ATL000083124Link
Rankiteo Explanation :
Attack threatening the organizationโ€™s existence

Description: Atlassian Confluence Data Center and Server versions were affected by a critical vulnerability identified as CVE-2023-22527, enabling threat actors to exploit the flaw for cryptomining campaigns. Due to the template injection vulnerability, remote attackers could execute arbitrary code, leading to unauthorized cryptocurrency mining using the organization's resources. This activity not only utilized the compromised infrastructure for mining but also had the potential to disrupt operations and financials through resource exhaustion and increase in operational costs. Atlassian released patches to address the issue, however, systems not updated remained at risk.

Atlassian Company Subsidiaries

SubsidiaryImage

Atlassian powers the collaboration that helps teams accomplish what would otherwise be impossible alone. From space missions and motor racing to bugs in code and IT requests, no task is too large or too small with the right team, the right tools, and the right practices. Over 300,000 global companies and 80% of the Fortune 500 rely on Atlassianโ€™s software, like Jira, Confluence, Loom, and Trello, to help their teams work better together and deliver quality results on time. With our 300,000+ customers and team of 10,000+ Atlassians, we are building the next generation of team collaboration and productivity software. We believe the power of teams has the potential to change the worldโ€”one that is more open, authentic, and inclusive.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=atlassian' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Atlassian Cyber Security News

2025-06-20T07:00:00.000Z
Cisco, Atlassian fixes, Ryuk member arrested, Viasat Typhoon attack

A 33 year old โ€œforeign nationalโ€ has been arrested in Kyiv and extradited to the U.S., for his alleged role in extorting more than $100 millionย ...

2025-05-21T07:00:00.000Z
Atlassian Warns of Multiple High-Severity Vulnerabilities Hits Data Center Server

The bulletin highlights several critical dependencies containing exploitable flaws across Atlassian's product line. Four distinct denial-of-ย ...

2025-04-17T07:00:00.000Z
Vulnerabilities Patched in Atlassian, Cisco Products

Confluence Data Center and Server received patches for two vulnerabilities, including a DoS flaw in the Netty application framework (tracked asย ...

2024-12-04T16:27:19.000Z
Introducing GravityZone XDR Integration for Atlassian Cloud Applications

Atlassian Cloud simplifies the way teams collaborate and manage projects throughout the entire development lifecycle. Through Jira, they can streamlineย ...

2025-04-08T07:00:00.000Z
HellCat Ransomware Hits 4 Firms using Infostealer-Stolen Jira Credentials

Cybersecurity researchers at Hudson Rock have identified a new wave of cyber attacks by the HellCat ransomware group, this time targeting fourย ...

2025-05-21T07:00:00.000Z
Atlassian Alerts Users to Multiple Critical Vulnerabilities Affecting Data Center Server

With a CVSS score of 7.2, this vulnerability could potentially allow attackers to gain unauthorized elevated permissions within affected systemsย ...

2025-06-30T15:03:59.000Z
Keepit offers Atlassian data backup to โ€˜ensureโ€™ business continuity

SaaS data backup specialist Keepit has officially launched protection for Atlassian's suite of collaboration tools Jira and Confluence,ย ...

2024-09-23T07:00:00.000Z
Dell reportedly hit by second data breach in space of a week

None

2025-01-13T08:00:00.000Z
Telefonica Breach Exposes Jira Tickets, Customer Data

The Hellcat ransomware group has stolen roughly 5000 documents, potentially containing confidential information, from the telecom giant'sย ...

similarCompanies

Atlassian Similar Companies

Broadcom Software

Broadcom Software modernizes, optimizes, and protects the worldโ€™s most complex hybrid environments. We are a global software leader delivering a comprehensive portfolio of industry-leading business-critical software enabling scalability, agility and security for the largest global companies in the w

Amazon is guided by four principles: customer obsession rather than competitor focus, passion for invention, commitment to operational excellence, and long-term thinking. We are driven by the excitement of building technologies, inventing products, and providing services that change lives. We embrac

JD.COM

JD.com, also known as Jingdong, is a leading e-commerce company transferring to be a technology and service enterprise with supply chain at its core. JD.comโ€™s business has expanded across retail, technology, logistics, health, insurance, property development, industrials, private label, and internat

bigbasket

Starting our journey in 2011, today, bigbasket - a Tata Enterprise is Indiaโ€™s largest online supermarket with over 13 million customers and a presence in 60+ cities & towns. With our presence spanning the entire spectrum of consumer needs, we operate through a range of business lines - bigbasket, bb

GlobalLogic

GlobalLogic, a Hitachi Group Company, is a full-lifecycle product development services leader that combines chip-to-cloud software engineering expertise and vertical industry experience to help our customers design, build, and deliver their next generation products and digital experiences. We expert

Infor

As a global leader in business cloud software specialized by industry. Infor develops complete solutions for its focus industries, including industrial manufacturing, distribution, healthcare, food & beverage, automotive, aerospace & defense, hospitality, and high tech. Inforโ€™s mission-critical ente

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Atlassian CyberSecurity History Information

How many cyber incidents has Atlassian faced?

Total Incidents: According to Rankiteo, Atlassian has faced 5 incidents in the past.

What types of cybersecurity incidents have occurred at Atlassian?

Incident Types: The types of cybersecurity incidents that have occurred incidents Vulnerability and Data Leak.

How does Atlassian detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through remediation measures with Patches Released and containment measures with Invalidated passwords on affected accounts and remediation measures with Issued instructions on how to reset passwords to all users and communication strategy with Notified users to reset passwords and containment measures with Prevent access to Confluence servers from the internet, Disable Confluence instances and communication strategy with Advised users to take preventive actions and remediation measures with Patching the vulnerability.

Incident Details

Can you provide details on each incident?

Incident : Cryptomining Campaign

Title: Atlassian Confluence Cryptomining Campaign

Description: Atlassian Confluence Data Center and Server versions were affected by a critical vulnerability identified as CVE-2023-22527, enabling threat actors to exploit the flaw for cryptomining campaigns. Due to the template injection vulnerability, remote attackers could execute arbitrary code, leading to unauthorized cryptocurrency mining using the organization's resources. This activity not only utilized the compromised infrastructure for mining but also had the potential to disrupt operations and financials through resource exhaustion and increase in operational costs. Atlassian released patches to address the issue, however, systems not updated remained at risk.

Type: Cryptomining Campaign

Attack Vector: Template Injection Vulnerability

Vulnerability Exploited: CVE-2023-22527

Motivation: Financial Gain

Incident : Data Breach

Title: Atlassian HipChat Data Breach

Description: Unidentified hackers gained access to a vast quantity of data from Atlassian's HipChat service by exploiting a vulnerability in a third-party software library used by the service.

Type: Data Breach

Attack Vector: Exploitation of Vulnerability

Vulnerability Exploited: Third-party software library vulnerability

Threat Actor: Unidentified hackers

Incident : Data Breach

Title: Atlassian Data Leak

Description: Atlassian reveals a data leak that was brought on by the theft of employee login information that was then utilized to obtain data from a third-party vendor.

Type: Data Breach

Attack Vector: Stolen Login Credentials

Vulnerability Exploited: Weak credential management

Motivation: Data Theft

Incident : Zero-Day Exploit

Title: Atlassian Confluence Server Zero-Day Vulnerability

Description: Atlassian warned its customers that multiple threat groups are exploiting a Confluence Server zero-day vulnerability in its servers. Any unauthenticated attackers can target its Confluence Server and Data Center by a critical vulnerability that can be exploited for remote code execution. The company advised its users to prevent access to their Confluence servers from the internet, or simply disable these instances, as all supported versions of Confluence Server and Data Center are affected. However, Atlassian expects fixes to become available soon.

Type: Zero-Day Exploit

Attack Vector: Remote Code Execution

Vulnerability Exploited: Confluence Server Zero-Day Vulnerability

Threat Actor: Multiple threat groups

Incident : Vulnerability Exploitation

Title: Confluence Server Webwork OGNL Injection Vulnerability

Description: Atlassian discovered a vulnerability in its Confluence Server which they need to patch to remedy a Critical-rated flaw. Confluence Server Webwork OGNL injection vulnerability could allow an authenticated user, or unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance. However, Atlassian's own Confluence Cloud was patched but other hosted Confluence offerings might be vulnerable.

Type: Vulnerability Exploitation

Attack Vector: Webwork OGNL injection

Vulnerability Exploited: Confluence Server Webwork OGNL injection

Motivation: Arbitrary code execution

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

How does the company identify the attack vectors used in incidents?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Vulnerability in third-party software library and Stolen Login Credentials.

Impact of the Incidents

What was the impact of each incident?

Incident : Cryptomining Campaign ATL000083124

Systems Affected: Atlassian Confluence Data Center, Atlassian Confluence Server

Operational Impact: Resource Exhaustion

Incident : Data Breach ATL116201123

Data Compromised: Hashed passwords, Email addresses, Names

Systems Affected: HipChat.com service

Incident : Data Breach ATL195481023

Data Compromised: names, email addresses, work departments, other details

Incident : Zero-Day Exploit ATL23554622

Systems Affected: Confluence Server, Data Center

Incident : Vulnerability Exploitation ATL0214622

Systems Affected: Confluence Server, Data Center instance

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Hashed passwords, Email addresses, Names and employee data.

Which entities were affected by each incident?

Incident : Cryptomining Campaign ATL000083124

Entity Type: Software Company

Industry: Technology

Incident : Data Breach ATL116201123

Entity Type: Corporation

Industry: Software Development

Incident : Data Breach ATL195481023

Entity Type: Organization

Industry: Software

Location: Australia

Incident : Zero-Day Exploit ATL23554622

Entity Type: Company

Industry: Software

Incident : Vulnerability Exploitation ATL0214622

Entity Type: Company

Industry: Software Development

Response to the Incidents

What measures were taken in response to each incident?

Incident : Cryptomining Campaign ATL000083124

Remediation Measures: Patches Released

Incident : Data Breach ATL116201123

Containment Measures: Invalidated passwords on affected accounts

Remediation Measures: Issued instructions on how to reset passwords to all users

Communication Strategy: Notified users to reset passwords

Incident : Zero-Day Exploit ATL23554622

Containment Measures: Prevent access to Confluence servers from the internet, Disable Confluence instances

Communication Strategy: Advised users to take preventive actions

Incident : Vulnerability Exploitation ATL0214622

Remediation Measures: Patching the vulnerability

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach ATL116201123

Type of Data Compromised: Hashed passwords, Email addresses, Names

Incident : Data Breach ATL195481023

Type of Data Compromised: employee data

Number of Records Exposed: 13200

Sensitivity of Data: Medium

Data Exfiltration: True

Personally Identifiable Information: names, email addresses, work departments, other details

What measures does the company take to prevent data exfiltration?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Patches Released, Issued instructions on how to reset passwords to all users, Patching the vulnerability.

How does the company handle incidents involving personally identifiable information (PII)?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through were Invalidated passwords on affected accounts, Prevent access to Confluence servers from the internet and Disable Confluence instances.

Lessons Learned and Recommendations

What recommendations were made to prevent future incidents?

Incident : Zero-Day Exploit ATL23554622

Recommendations: Prevent access to Confluence servers from the internet, Disable Confluence instances

What recommendations has the company implemented to improve cybersecurity?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Prevent access to Confluence servers from the internet, Disable Confluence instances.

References

Where can I find more information about each incident?

Incident : Data Breach ATL195481023

Source: Atlassian Data Breach Report

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Atlassian Data Breach Report.

Investigation Status

How does the company communicate the status of incident investigations to stakeholders?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through were Notified users to reset passwords and Advised users to take preventive actions.

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Data Breach ATL116201123

Entry Point: Vulnerability in third-party software library

Incident : Data Breach ATL195481023

Entry Point: Stolen Login Credentials

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident?

Incident : Data Breach ATL195481023

Root Causes: Weak credential management

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident were an Unidentified hackers and Multiple threat groups.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Hashed passwords, Email addresses, Names, names, email addresses, work departments and other details.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident were Atlassian Confluence Data Center, Atlassian Confluence Server and HipChat.com service and Confluence Server, Data Center and Confluence Server, Data Center instance.

Response to the Incidents

What containment measures were taken in the most recent incident?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Invalidated passwords on affected accounts, Prevent access to Confluence servers from the internet and Disable Confluence instances.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Hashed passwords, Email addresses, Names, names, email addresses, work departments and other details.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 132.0.

Lessons Learned and Recommendations

What was the most significant recommendation implemented to improve cybersecurity?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Prevent access to Confluence servers from the internet, Disable Confluence instances.

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident is Atlassian Data Breach Report.

Initial Access Broker

What was the most recent entry point used by an initial access broker?

Most Recent Entry Point: The most recent entry point used by an initial access broker were an Stolen Login Credentials and Vulnerability in third-party software library.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge