Overview
Theconfluence embed command embeds a 1x1 pixel image hosted on an attacker-controlled server into a Confluence page. This technique is used for credential farming attacks, where the target’s browser or application will make an authenticated request to the attacker’s server when viewing the page, potentially leaking authentication tokens, session cookies, or NetNTLM hashes.
This is one of AtlasReaper’s most powerful offensive features for harvesting credentials without requiring the target to download or execute anything.
Syntax
Required Parameters
The base URL of the Confluence instance (e.g.,
https://example.atlassian.net)The page ID where the 1x1 pixel image will be embedded. Page IDs can be discovered using the
confluence listpages commandURL to your listener/attacker server that will host the 1x1 pixel image (e.g.,
http://attacker.com/pixel.png or file://attacker.com/share/image.png)Optional Parameters
Authentication cookie (
cloud.session.token or tenant.session.token). If omitted, the command will attempt anonymous access (if enabled on the target)Context message to add to the page (e.g., “I need you to take a look at this”). This increases the likelihood the target will view the page
User ID to mention (@) on the page, generating a notification to increase engagement. User IDs can be obtained using the
jira listusers commandSave command output to a specified file
Examples
- Basic Pixel Embedding
- NetNTLM Hash Capture
- Multiple Target Campaign
Use Cases
Red Team Perspectives
Red Team Perspectives
Credential Harvesting
- Capture NetNTLM hashes when Windows users view the page (using file:// UNC paths)
- Harvest authentication tokens sent in HTTP requests to attacker infrastructure
- Collect session cookies if users’ browsers send them with the image request
- Capture authorization headers from automated systems or bots that parse Confluence pages
- Identify active users by tracking who views specific pages
- Collect user agent strings to identify client software and versions
- Gather IP addresses to map internal network ranges
- Determine organizational work patterns (when pages are viewed)
- Embed pixels in high-traffic pages to maximize harvest
- Use @mentions to ensure specific high-value targets view the page
- Combine with social engineering messages to increase view likelihood
- Target pages that specific job roles or teams must access regularly
- Track when compromised accounts are accessed or investigated
- Monitor administrative access to sensitive pages
- Detect when incident response teams are reviewing your activities
- Maintain awareness of which users are active in the environment
Blue Team Perspectives
Blue Team Perspectives
Threat Detection Indicators
- Embedded images pointing to external domains (not approved content delivery networks)
- UNC file:// paths embedded in Confluence pages
- Unexpected 1x1 pixel images with no legitimate business purpose
- External image loads from unusual or newly registered domains
- Pages modified to include external content by compromised accounts
- Search Confluence page content for “img src” tags pointing to external URLs
- Review audit logs for page modifications that add external media
- Monitor web proxy logs for requests to suspicious domains from Confluence users
- Identify patterns of external image requests correlated with page views
- Look for authentication failures or hash capture attempts in security logs
- Disable external image loading in Confluence (Content Security Policy)
- Implement web proxy filtering to block requests to unknown external domains
- Enable SMB signing and disable NetNTLM authentication where possible
- Configure alerts for embedded UNC paths in collaboration platforms
- Require approval for embedding external content in Confluence pages
- Monitor outbound authentication attempts to external hosts
- Identify all users who viewed the page containing the malicious embed
- Determine if any credentials were harvested (check authentication logs)
- Review the page edit history to identify when the embed was added
- Assess the privileges of users who viewed the page
- Reset credentials for affected users if hash capture is suspected
- Remove the embedded content and restore the page to previous version
Output
The command returns information about the embed operation:- Confirmation that the embed was successful
- Page ID where the image was embedded
- The URL of the embedded image
- Any errors or warnings encountered
Detection Considerations
Confluence Audit Logs- Page edit events will show the compromised account modifying pages
- Audit logs include timestamp, username, page ID, and change type
- Embedding external content may generate specific audit events
- Organizations with strict CSP may block external image loading
- Browser console will show CSP violations if configured
- Modern Confluence instances may have default CSP that prevents this attack
- Outbound requests to attacker infrastructure will be logged
- Web filters may block access to unknown or malicious domains
- Network monitoring may alert on unusual outbound connections
- Users mentioned with @username will receive email notifications
- Notification emails may be reviewed by security teams during investigations
- High-value targets may report suspicious mentions
- Authentication attempts to external hosts may trigger IDS/IPS alerts
- NetNTLM hash capture attempts are detectable by endpoint security solutions
- Unusual SMB traffic to external hosts is a strong indicator of compromise
OPSEC Considerations
-
Infrastructure Setup
- Use domains that blend with the target environment (avoid obviously malicious names)
- Consider using legitimate cloud services (AWS, Azure) to host your listener
- Implement HTTPS on your listener to reduce suspicion
- Use domain fronting or CDN services to obscure the true destination
-
Payload Hosting
- Actually host a 1x1 pixel image to avoid 404 errors that may be logged
- Configure your web server to log all incoming requests with full headers
- Set up automated credential capture and notification systems
- Consider using unique URLs per target to track which user accessed the page
-
Social Engineering Quality
- Craft messages that match organizational communication style
- Reference real projects or initiatives to increase legitimacy
- Choose appropriate pages where the message context makes sense
- Time the operation during normal business hours for the target user
-
Target Selection
- Focus on high-value users (admins, developers, executives)
- Choose pages that targets are likely to view regularly
- Consider using team/project pages rather than personal spaces
- Be selective with @mentions to avoid mass notifications
-
Timing Considerations
- Perform the embed operation during business hours
- Consider time zones and typical work schedules
- Space out operations if targeting multiple pages
- Be prepared to capture credentials quickly (users may only view once)
-
Cleanup and Attribution
- Be aware that page history will show the edit
- Consider removing the embed after successful credential capture
- Remember that even deleted content may be recoverable
- The compromised account username will be attributed to the action
-
Technical Constraints
- Test whether the target Confluence instance allows external image loading
- Verify that network egress filtering doesn’t block your listener
- For NetNTLM capture, ensure SMB traffic can reach your server
- Be aware of potential CSP policies that may block the technique
-
Legal and Ethical
- Ensure proper authorization for credential harvesting operations
- This technique actively harvests authentication material
- Document scope and approval for offensive operations
- Consider the ethical implications of credential harvesting
Related Commands
- confluence link - Alternative method using hyperlinks instead of embedded images
- confluence attach - Attach malicious files that may also harvest credentials when opened
- confluence listpages - Identify high-value pages for embedding operations
- jira listusers - Obtain user IDs for targeted @mentions
- confluence search - Find pages with specific content or high visibility