Threat actors targeting unpatched Citrix NetScaler systems exposed to the internet are being tracked by Sophos X-Ops.
Citrix was discovered with a Zero-Day vulnerability on their Citrix NetScaler Application Delivery Controller (ADC) that allowed threat actors to perform remote code execution at the beginning of August.
According to a Fox-IT report earlier this month, approximately 2,000 NetScaler systems are compromised worldwide.
In mid-August, the threat actors used the Critical-class NetScaler vulnerability as a code-injection tool to conduct a domain-wide attack once the targets were infected.
Later stages of that attack included behaviors such as Payload injection into wuauclt(.)exe or wmiprvse(.)exe and the use of BlueVPS ASN 62005 for malware staging.
In addition to that, they use highly obfuscated PowerShell scripts with distinctive arguments and drop randomly named PHPwebshells (/var/VPN/theme/[random].php) on victim machines.
Citrix issued a patch for the CVE-2023-3519 issue on July 18 and has further details in their advisory.
Sophos recommends the users of Citrix NetScaler infrastructure immediately check it for signs of compromise and also to patch the vulnerability.
Patching alone won’t address attacks already using the vulnerability to gain access to the system, so both actions are necessary for proper protection.
It also recommends defenders examine their data, particularly data from before mid-July, to see if other of these IoCs now seen in the NetScaler attacks have appeared prior to the announcement of the new vulnerability.
A list of IoCs for this case will be made available on GitHub
Indicator of compromise
|sha256||94f09d01e1397ca80c71b488b8775acfe2776b5ab42e9a54547d9e5f58caf11a||malicious .net DLL|
|sha256||2d53aaa2638f9a986779b9e36a7b6dfdaddf3cc06698f4aa9f558c1a0591dc9a||malicious .net DLL|