{"id":36630,"date":"2024-12-13T23:52:18","date_gmt":"2024-12-13T22:52:18","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=36630"},"modified":"2024-12-13T23:52:18","modified_gmt":"2024-12-13T22:52:18","slug":"german-cert-also-warns-of-massive-wave-of-attacks-on-citrix-netscaler-gateways-dec-2024","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2024\/12\/13\/german-cert-also-warns-of-massive-wave-of-attacks-on-citrix-netscaler-gateways-dec-2024\/","title":{"rendered":"German CERT also warns of massive wave of attacks on Citrix Netscaler gateways (Dec. 2024)"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2024\/12\/10\/bsi-warnt-nun-auch-vor-massiver-angriffswelle-auf-citrix-netscaler-gateways\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]A few days ago, I warned in the blog post <a href=\"https:\/\/borncity.com\/win\/2024\/12\/07\/massive-wave-of-attacks-on-citrix-netscaler-gateways-since-5-and-6-dec-2024\/\">Massive wave of attacks on Citrix Netscaler gateways since 5, and 6, Dec. 2024?<\/a> about a massive wave of attempted attacks on Citrix Netscaler gateways since around Dec. 5, 2024. Now the German Federal Office for Information Security (BSI) &#8211; the German CERT-Bund &#8211; is also warning of attacks on Citrix Netscaler gateways.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg02.met.vgwort.de\/na\/9f46e2e991b84f0d91ec247954336843\" alt=\"\" width=\"1\" height=\"1\" \/>The NetScaler Gateway from Citrix enables remote access from devices to the internal network and internal resources. According to <a href=\"https:\/\/docs.citrix.com\/de-de\/citrix-endpoint-management\/authentication\/gateway-and-endpoint-management.html\" target=\"_blank\" rel=\"noopener\">this page<\/a>, users can use the Citrix Gateway Service (Preview) or an on-premises NetScaler Gateway.<\/p>\n<h2>Attack attempts on NetScaler Gateway (December 5, 2024)<\/h2>\n<p>German blog reader Christian informed me on December 6, 2024 about massive attacks he had observed on his company's Citrix NetScaler Gateway on December 5, 2024. Between 5 p.m. and 10 p.m. there were massive attack attempts, probably the attackers tried to hack the accesses using random data from brute force lists. Christian had sent me the following list of standard usernames that were tried during the access attempts as a screenshot.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i.postimg.cc\/pdTrrtT7\/image.png\" alt=\"Zufalls-Zugangsdaten\" width=\"376\" height=\"770\" \/><\/p>\n<p>Christian stated that there had been over 20,000 login attempts in his company environment. These types of attacks by \"probing\" Citrix Netscaler Gateway instances accessible on the Internet are not new. But it is also known that this is how cyberattacks of the past began. The reader also wrote that there had also been some much more targeted attempts with domain-specific emails on the company's Citrix Netscaler Gateway.<\/p>\n<h2>CERT-Bund warning<\/h2>\n<p>In the meantime, I came across the following <a href=\"https:\/\/x.com\/certbund\/status\/1866413359815401546\" target=\"_blank\" rel=\"noopener\">tweet<\/a> on X and <a href=\"https:\/\/www.borncity.com\/blog\/2024\/12\/06\/massive-angriffswelle-auf-citrix-netscaler-gateways-5-12-2024\/#comment-202427\" target=\"_blank\" rel=\"noopener\">this reader<\/a> comment from Stefan A. (thank you).<\/p>\n<p><a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Cybersicherheitswarnungen\/DE\/2024\/2024-298922-1032\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i.postimg.cc\/httfYx2z\/image.png\" alt=\"BSI Warnung vor Angriffen auf NetScaler\" width=\"603\" height=\"362\" \/><\/a><\/p>\n<p>The German Federal Office for Information Security (BSI) warns of exactly the scenario outlined above in the article <a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Cybersicherheitswarnungen\/DE\/2024\/2024-298922-1032\" target=\"_blank\" rel=\"noopener\">Version 1.0: Brute-Force-Angriffe auf exponierte Systeme<\/a> from December 10, 2024. The BSI is receiving more and more reports of brute force attacks against Citrix Netscaler gateways from various critical infrastructure sectors and international partners. The BSI also refers \"to media reports\" (which was my blog post <a href=\"https:\/\/borncity.com\/win\/2024\/12\/07\/massive-wave-of-attacks-on-citrix-netscaler-gateways-since-5-and-6-dec-2024\/\">Massive wave of attacks on Citrix Netscaler gateways since 5, and 6, Dec. 2024?<\/a>) and writes that the current attacks stand out from the usual attacks of this type in terms of the reported volume.<\/p>\n<p><a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Cybersicherheitswarnungen\/DE\/2024\/2024-298922-1032.pdf?__blob=publicationFile&amp;v=2\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i.postimg.cc\/VkZBZzWw\/image.png\" alt=\"BSI Warnung vor Netscaler-Angriffen\" width=\"640\" height=\"670\" \/><\/a><\/p>\n<p>In brute force attacks, attackers attempt to guess weak user name\/password combinations with a massive number of login attempts. If attackers succeed in gaining access, they attempt to gain pertinent access at network level using a backdoor. Systems are then compromised in order to extract data and\/or encrypt systems with ransomware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]A few days ago, I warned in the blog post Massive wave of attacks on Citrix Netscaler gateways since 5, and 6, Dec. 2024? about a massive wave of attempted attacks on Citrix Netscaler gateways since around Dec. 5, 2024. &hellip; <a href=\"https:\/\/borncity.com\/win\/2024\/12\/13\/german-cert-also-warns-of-massive-wave-of-attacks-on-citrix-netscaler-gateways-dec-2024\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[448,580,1547],"tags":[701,69,1544],"class_list":["post-36630","post","type-post","status-publish","format-standard","hentry","category-devices","category-security","category-software","tag-device","tag-security","tag-software"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/36630","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=36630"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/36630\/revisions"}],"predecessor-version":[{"id":36631,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/36630\/revisions\/36631"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=36630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=36630"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=36630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}