- Buy Microsoft Visio Professional or Microsoft Project Professional 2024 for just $80
- Get Microsoft Office Pro and Windows 11 Pro for 87% off with this bundle
- Buy or gift a Babbel subscription for 78% off to learn a new language - new low price
- Join BJ's Wholesale Club for just $20 right now to save on holiday shopping
- This $28 'magic arm' makes taking pictures so much easier (and it's only $20 for Black Friday)
Mass-Exploitation Campaign Targets Citrix NetScalers With Backdoors
A widespread cyber-attack targeting thousands of Citrix NetScalers has been unveiled by cybersecurity firm Fox-IT (part of NCC Group) in collaboration with the Dutch Institute of Vulnerability Disclosure (DIVD).
The campaign involved exploiting a critical vulnerability, CVE-2023-3519, which allowed malicious actors to infiltrate and compromise vulnerable NetScalers, even after patches and reboots.
Describing the threat in an advisory published on Tuesday, NCC Group said the scale of the attack became evident as over 1900 NetScalers were found to be still backdoored at the time of discovery.
The attackers employed automated methods to place web shells onto compromised systems, granting them persistent access and the ability to execute arbitrary commands. Despite efforts to apply patches and updates, only half of the compromised NetScalers had been successfully updated to fix the vulnerability.
The vulnerability itself was disclosed on July 18, following reports of limited exploitation by various security organizations. This prompted a joint effort by Fox-IT and DIVD to identify compromised systems and initiate responsible disclosure notifications.
Read more on these events: Thousands of Citrix Servers Exposed to Zero-Day Bug
In the new advisory, NCC Group revealed that the compromised NetScalers were spread across different countries, with the majority located in Europe. However, a notable portion remained untouched in countries like Canada, Russia and the United States.
In response, Fox-IT and DIVD released recommendations for NetScaler administrators to assess the security of their systems. The suggestions include performing Indicator of Compromise (IoC) checks, utilizing provided tools like Python scripts for forensic analysis and investigating possible unauthorized activities if a web shell is detected.
The incident highlights the ongoing challenge of securing edge devices such as NetScalers, as attackers exploit vulnerabilities before patches can be applied.
This development emerged just one week after the Shadowserver Foundation announced that it detected nearly 7000 exposed and unpatched instances of NetScaler ADC and Gateway.