In an attempt to fight the spread of Coronavirus, Governments are carrying out social distancing measures with the cooperation of its citizens, local agencies, and businesses. With remote work becoming the new normal, companies are setting up tools and processes to facilitate to ensure their business is not affected by the crisis. This has led to the unprecedented adoption and usage of Project management and internal ticketing tools such as Atlassian JIRA and Asana. However, it was recently found that several of Atlassian JIRA’s internal service desks were found publicly exposed and attackers were able to retool them to act as internal service ticket portals. The following Google dork compiles the list of open JIRA service desks: site:atlassian.net AND “Enter your e-mail address and we will send you a private sign up link” This allows attackers to sign up as employees and raise legitimate internal requests. Since all internal requests are not authenticated, attackers take advantage of the situation to set up projects for multiple departments such as IT, Finance, Legal, HR, etc. This provides the attackers a leeway to access to users’ email addresses, employee information, customer details, social media channels and internal tools. It also allows them to make changes to online assets, request salary changes, and even request for access badges to the company’s office premises. So, if you are working remotely, ensure all your project management, ticketing, and collaboration tools are secure.