01 logo

Over 640 Citrix Servers are Compromised & Implanted with Web Shells

Over 15,000 initially susceptible appliances decreased to less than 10,000. Citrix issued urgent security updates on July 18th to counter the issue and advised prompt patching.

By Jason DavisPublished 9 months ago 4 min read
Like

A series of targeted attacks have resulted in the compromise and infection of multiple Citrix Netscaler ADC and Gateway servers. These attacks exploited a significant remote code execution vulnerability, specifically identified as CVE-2023-3519. Notably, this vulnerability was previously exploited as a zero-day exploit to breach the network of a critical infrastructure organization within the United States.

The Shadowserver Foundation, a non-profit organization dedicated to enhancing internet security, has recently disclosed that attackers have successfully planted web shells on a minimum of 640 Citrix servers as part of these orchestrated attacks.

Shadowserver CEO Piotr Kijewski says the recent attack resembles the China Chopper pattern. They haven't shared more details due to the circumstances. There are fewer detected instances than believed. Shadowserver found 640 compromised appliances with web shells as of July 30, 2023. They know about widespread exploitation on July 20th. If your system isn't patched, it's likely compromised. Shadowserver thinks there are more web shells linked to CVE-2023-3519 than the reported 640 instances.

Around two weeks ago, an estimated 15,000 vulnerable Citrix appliances were found susceptible to CVE-2023-3519 attacks. However, this number has since decreased to fewer than 10,000, indicating some positive progress in addressing the vulnerability.

Citrix responded to the situation on July 18th by issuing security updates aimed at mitigating the Remote Code Execution (RCE) vulnerability. The company acknowledged the presence of exploits targeting vulnerable appliances and urgently advised customers to swiftly apply the provided patches.

The vulnerability primarily impacts unpatched Netscaler appliances configured as gateways, including VPN virtual servers, ICA Proxy, CVPN, and RDP Proxy, as well as authentication virtual servers (AAA server).

On the same day, Citrix not only addressed CVE-2023-3519 but also tackled two other high-severity vulnerabilities: CVE-2023-3466 and CVE-2023-3467. These vulnerabilities have the potential to be exploited for reflected cross-site scripting (XSS) attacks and privilege escalation to gain root access.

In response to the ongoing attacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a directive to U.S. federal agencies, mandating the safeguarding of Citrix servers on their networks by August 9th.

The advisory from CISA also underscored that the vulnerability had already been leveraged to breach the systems of a critical infrastructure entity within the United States.

According to CISA, threat actors capitalized on the vulnerability as a zero-day exploit in June 2023. They deployed a web shell on a NetScaler ADC appliance owned by a critical infrastructure organization. This allowed the attackers to explore the victim's active directory (AD) and obtain AD data, which they subsequently exfiltrated. Fortunately, their attempt to move laterally to a domain controller was thwarted by network-segmentation controls in place on the appliance.

In today's rapidly evolving digital landscape, protecting sensitive data and ensuring the security of critical business operations have become paramount. Enter KeplerSafe, a cutting-edge cybersecurity service that offers a holistic approach to safeguarding your organization's endpoints, emails, cloud applications, and data from a wide range of cyber threats.

Endpoint Protection

KeplerSafe's Endpoint Protection solution is designed to fortify your organization's devices, ensuring that every endpoint is shielded against the ever-increasing variety of malware, ransomware, and zero-day exploits. By leveraging advanced threat detection and prevention technologies, KeplerSafe monitors endpoint activities in real-time, identifying and neutralizing malicious behavior before it can wreak havoc. With features such as behavioral analysis, signature-based detection, and machine learning, KeplerSafe's Endpoint Protection provides a multi-layered defense strategy that keeps your devices and network secure without compromising performance.

Email Protection

Cybercriminals often use email as a primary attack vector. KeplerSafe's Email Protection solution employs state-of-the-art email filtering, content analysis, and anti-phishing techniques to keep your inbox free from malicious attachments, links, and fraudulent emails. By utilizing advanced AI-driven algorithms, KeplerSafe identifies and blocks sophisticated phishing attempts and business email compromise (BEC) scams, providing your organization with a robust shield against email-based threats. With real-time threat intelligence and automatic email encryption, KeplerSafe ensures that your communication remains confidential and secure.

Cloud Apps Security

As businesses increasingly migrate to cloud-based applications, the need for robust cloud security has become paramount. KeplerSafe's Cloud Apps Security solution provides comprehensive protection for your cloud-based assets. By continuously monitoring user activities, KeplerSafe identifies unauthorized access attempts, suspicious behavior, and data exfiltration within your cloud environment. With a focus on identity and access management, data encryption, and real-time activity tracking, KeplerSafe helps you maintain control over your cloud applications and data while adhering to compliance standards.

Data Protection

Your organization's data is its most valuable asset, and protecting it is non-negotiable. KeplerSafe's Data Protection solution employs a combination of encryption, access controls, and data loss prevention (DLP) mechanisms to ensure the confidentiality, integrity, and availability of your critical data. Whether data is at rest, in transit, or in use, KeplerSafe's comprehensive data protection measures guard against breaches, leaks, and unauthorized access. By implementing robust encryption protocols and AI-driven anomaly detection, KeplerSafe empowers you to maintain data security across your entire infrastructure.

In an era of escalating cyber threats and sophisticated attacks, KeplerSafe stands as a stalwart defender of your organization's digital assets. With its advanced endpoint protection, email protection, cloud apps security, and data protection solutions, KeplerSafe provides a comprehensive cybersecurity framework that adapts to the evolving threat landscape. By partnering with KeplerSafe, your organization gains the peace of mind that comes from knowing that its digital ecosystem is fortified against even the most formidable adversaries.

cybersecurity
Like

About the Creator

Jason Davis

With over two decades of experience in the field, Jason Davis is a seasoned cyber security expert. His expertise extends across diverse systems, from small-scale businesses to large multinational organizations.

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2024 Creatd, Inc. All Rights Reserved.