The threat landscape has been intensified due to the recent disclosure of critical vulnerabilities affecting Citrix NetScaler. The two disclosed vulnerabilities, CVE-2024-8534 and CVE-2024-8535, were announced in November 2024. A surge in brute-force attacks is currently targeting Citrix NetScaler devices across various organizations, as attackers are exploiting misconfigured and outdated systems. CVE-2024-8534 is a memory safety flaw that may cause memory corruption and denial of service, while CVE-2024-8535 allows authenticated users to access unintended capabilities due to a race condition. As revealed by Ethan Fite, the Director of Managed Services Operations at Cyderes, the attackers are using a distributed brute-force strategy where the IP addresses and Autonomous System Numbers (ASNs) are changed after each attempt. This makes it challenging for security teams to identify and mitigate these attacks. As reported by the German Federal Office for Information Security (BSI), the brute-force attacks are highly common, especially within the critical infrastructure sector and other international organizations. Cybersecurity professionals advises urgent measures to be taken by cutting off high-risk IP range belonging to the cloud company from Hong Kong and installing updates and upgrades in patches on the NetScaler box and checking configurations that point out to safe setting through Remote Desktop Protocol, also. Citrix already publishes the security updates fixing vulnerability issues, but some others, like 12.1 and 13.0, are unsupported today and remain vulnerable. Experts further recommend that geographic blocking, monitoring for unusual activity, and the prompt application of security patches be implemented to further protect systems. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has also issued alerts on these vulnerabilities, highlighting the risks of exploitation. Organizations using Citrix NetScaler are advised to take swift action to protect their systems against these ongoing and evolving threats.
CERT-UA has reported a large-scale phishing campaign in which threat actors impersonated the agency to distribute a remote access trojan (RAT) known as AGEWHEEZE. The campaign, att...
A critical vulnerability identified as CVE-2026-33026 affects the backup and restore functionality of nginx-ui, exposing systems to severe security risks. This flaw enables attacke...
Microsoft has identified a new malware campaign that distributes malicious Visual Basic Script (VBS) files through WhatsApp messages, targeting Windows users. The campaign relies h...