A hacking group has exploited a critical vulnerability in Citrix NetScaler servers to compromise close to 2,000 servers in a massive campaign, before patches could be applied.
As of 8/14 Fox-IT researchers report that of some 31,127 vulnerable servers, more than 1,900 remain “backdoored” and of those found, 1,248 had already been patched, but were never checked for signs of successful exploitation.
The vulnerability, tracked as CVE-2023-3519, allows hackers to execute arbitrary code on the servers without authentication allowing them to do anything they want on the servers, including steal data, install malware, or disrupt operations.
Main Takeaways:
- A set of vulnerabilities in NetScaler, one of which allows for remote code execution, were disclosed on July 18th. This disclosure was published after several security organizations saw limited exploitation of these vulnerabilities in the wild.
- Fox-IT (in collaboration with the Dutch Institute of Vulnerability Disclosure) have scanned for these webshells to identify compromised systems. Responsible disclosure notifications have been sent by the DIVD.
- At the time of this exploitation campaign, 31127 NetScalers were vulnerable to CVE-2023-3519.
- As of August 14th, 1828 NetScalers remain backdoored.
- Of the backdoored NetScalers, 1248 are patched for CVE-2023-3519.
David Mitchell, Chief Technical Officer, HYAS had this to say:
“Unfortunately, this is far from the first time this has happened in recent memory. In previous campaigns, attackers gained footholds within F5, Fortinet and VMware appliances through exposed management interfaces in order to avoid detection by EDR software.
“Regardless if the exploit is already in the wild, customers are expected to monitor their devices for the IOCs before and after the patch is applied — which is obviously not at an acceptable level. The reason for this gap may be education, outsourced managed devices or division of security labor within an organization, but I do not expect attacks on network devices to stop anytime soon.”
Clearly simply patching everything isn’t enough. You also have to make sure that the bad guys aren’t already in. Which means that you need to take more rigorous steps to make sure that you’re not on the wrong end of a headline.




LinkedIn Accounts Pwned In Massive Hacking Campaign
Posted in Commentary with tags Hacked, LinkedIn on August 17, 2023 by itnerdAs reported by Cyberint, LinkedIn is being targeted in a surge of account hacks, takeovers and lockouts with the inability for users to resolve the issues through LinkedIn’s support.
“While LinkedIn has not yet issued an official announcement, it appears that their support response time has lengthened, with reports of a high volume of support requests,” reports Cyberint’s researcher Coral Tayar.
Meanwhile, users have taken to various online forums such as Twitter and Reddit to air their frustrations regarding LinkedIn’s lack of response and support in recovering the breached accounts, some reporting it’s been almost a week and they haven’t received assistance yet.
As observed by Cyberint in many accounts, the attackers appear to be using leaked credentials or brute-force to attempt to gain control. For accounts that are well protected, the takeover attempts only resulted in a temporary account lock, but when the hackers successfully took over LinkedIn accounts, they quickly swapped the associated email address, changed the password, and in some instances even turned on 2FA making the account recovery process even more difficult.
In some instances, the attackers demanded a small ransom to return the accounts back to the owners and in others they simply deleted the accounts without asking for anything.
Emily Phelps, Director, Cyware had this to say:
“We live a significant part of our lives online, and we don’t want our online identities in the wrong hands. I have no doubt that LinkedIn is receiving a tremendous increase in support requests, which likely accounts for the slow response time, it is advisable to reach out to your customers and inform them of the steps you’re taking to rectify the situation.”
If you maintain a LinkedIn account, now would be a good time to review the security measures you’ve activated, enable 2FA, and switch to a unique and long password. As for LinkedIn, I can’t find any evidence that they’ve commented on this. Which doesn’t look good on them at all.
Leave a comment »