Interesting Citrix Netscaler bug being mass exploited in the wild for about a month.

This is the HTTP request:

GET /oauth/idp/.well-known/openid-configuration HTTP/1.1
Host: a <repeated 24812 times>
Connection: close

It replies with system memory, which includes session tokens that you can use it gain remote access, bypassing authentication including MFA.

I think this one may have more legs than people realise. #threatintel

https://www.assetnote.io/resources/research/citrix-bleed-leaking-session-tokens-with-cve-2023-4966

Citrix Bleed: Leaking Session Tokens with CVE-2023-4966

It's time for another round Citrix Patch Diffing! Earlier this month Citrix released a security bulletin which mentioned "unauthenticated buffer-related vulnerabilities" and two CVEs. These issues affected Citrix NetScaler ADC and NetScaler Gateway.

Btw I don’t know if anybody has built a remote scanner for that vuln yet, but you should be able make one unauth using that blog - I bet loads of orgs haven’t actually patched.

I published a remote scanner for #CitrixBleed so you can check if you're vulnerable:

https://github.com/GossiTheDog/scanning/blob/main/CitrixBleed.curl

btw if Curl spits out "unsafe legacy renegotiation disabled" you need to edit /etc/ssl/openssl.cnf and add Options = UnsafeLegacyServerConnect at the end, under [system_default_sect] - Citrix Netscaler ships with an unsafe TLS implementation.

scanning/CitrixBleed.curl at main · GossiTheDog/scanning

Contribute to GossiTheDog/scanning development by creating an account on GitHub.

GitHub

#CitrixBleed is under very wide exploitation now - over 70 IPs are hammering the whole internet per @greynoise.

This one allows full MFA bypass even after patching as sessions persist on reboot, unless you kick off existing sessions manually. So I'd suggest patching and booting people off. Instructions for resetting sessions: https://www.netscaler.com/blog/news/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway/

CVE-2023-4966: NetScaler Critical Security Update Now Available

CVE-2023-4966 affects NetScaler ADC and NetScaler Gateway and, if exploited, could result in unauthorized data disclosure. Learn more.

NetScaler Blog

CitrixBleed in Citrix Netscaler/ADC is under mass exploitation. A ransomware group has distributed an exploit to their operators too.

#threatintel #mspaint
https://doublepulsar.com/mass-exploitation-of-citrixbleed-vulnerability-including-a-ransomware-group-1405cbb9de18?sk=6c6a183bfaa9f69eff86c9c25e4c2326

Quick update on #CitrixBleed - tracking just over 20k exploited Netscaler servers so far today, where session tokens have been stolen.

How? Have a honeypot running to gather data on attackers, then compare with Netflow via industry friends. Two TCP connections (first large) plus Shodan cross reference to validate Netscaler victim.

Also it turns out in March of this year somebody documented how to replay the session token to bypass MFA/login: https://www.vulnerability-db.com/?q=articles/2023/07/03/citrix-gateway-cloud-mfa-insufficient-session-validation-vulnerability

Here's #CitrixBleed in action. Ignore the username/password, can be anything.
Here’s the most recent #CitrixBleed exploitation data from @greynoise. 114 unique IPs spraying the internet and stealing session tokens. #threatintel

139 unique IPs are spraying internet with #CitrixBleed session token theft, which allows both credential and MFA bypass.

My write up for those who missed it:
https://doublepulsar.com/mass-exploitation-of-citrixbleed-vulnerability-including-a-ransomware-group-1405cbb9de18?sk=6c6a183bfaa9f69eff86c9c25e4c2326

Contains two details not in any other write up:

- The initial openid exploitation string isn’t logged anywhere. At all.
- The public exploit also calls GetUserName with a python user agent. If you have logs in Microsoft Sentinel, Splunk etc you can use this to hunt.

The internet got mass sprayed from Oct 24.

I would also point out the one time I used Matthew Perry in a post, he died. Pray I don’t GIF you.

A fun #CitrixBleed stat is over half of orgs haven’t patched still. That includes telcos, electric companies, food companies, governments etc etc. The CISA requirement to patch in USG is in mid November.

My blog post on it has under 1000 views.

Meanwhile some IBM post about hypothetical AI phishing is *all over* LinkedIn.

Mandiant has a new blog out on #CitrixBleed which backs up a key point from my blog https://www.mandiant.com/resources/blog/session-hijacking-citrix-cve-2023-4966

The initial exploit string isn’t logged.. at all.

There’s some good hunting stuff in the blog (ICA sessions) - I’d say combine it with the GetUserName thing in my blog for assurance.

The other big take away is a ton of orgs have been compromised and don’t know yet. #threatintel

Investigation of Session Hijacking via Citrix NetScaler ADC and Gateway Vulnerability (CVE-2023-4966) | Mandiant

Mandiant

I don’t know if any CERTs/NCSCs/etc follow me by I think y’all need to start banging loud drums about getting orgs to patch #CitrixBleed.

People are going wild with it - it’s point and click simple access to Remote Desktop inside orgs firewalls without generating any alerts or logs.

The ransomware victims for #CitrixBleed are starting to arrive into multiple IR firms I’ve talked to, where the threat actors have made it to domain admin.

It’s like a party in a sweet shop where there’s too many targets vs operators so expect it to be a slow burn.

Btw if it helps anybody, one of the groups are deploying Atera in ICA/RDP sessions.

Reasons:
- Legit remote access tool. No AV or EDR alerts.
- allows remote interactive command prompt and PowerShell
- reverse proxy, works behind firewall

So you take over a session, install that, and then disconnect. You then have persistent access to endpoint after patching of Netscaler.

Ransomware groups are basically a cheaper and better managed MSP.

#CitrixBleed update, about 87% of exposed instances have been patched 🎉 it’s still around 5k unpatched.
Australian Signals Directorate has assessed that there is significant exposure to Citrix NetScaler ADC and NetScaler Gateway vulnerabilities in Australia and that any future exploitation would have significant impact to Australian systems and networks https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/citrix-products-netscaler-adc-and-netscaler-gateway-zero-day-vulnerability

Looping this in to this thread - a few days ago I wrote another blog about this.

“LockBit ransomware group assemble strike team to breach banks, law firms and governments.”

Since publishing multiple ransomware groups have joined in. They are stealing data and extorting organisations.

https://doublepulsar.com/lockbit-ransomware-group-assemble-strike-team-to-breach-banks-law-firms-and-governments-4220580bfcee

Citrix Bleed WFH Hack and Exploit: News on Data Loss Flaw

A critical flaw in software from Citrix Systems Inc., a company that pioneered remote access so people can work anywhere, has been exploited by government-backed hackers and criminal groups, according to a US cyber official.

Bloomberg

New #CitrixBleed blog (where the vendor has moved it from Citrix.com to a different website).

Essential point is run the commands to kill active sessions. I have more to come on this point, somebody harvested session tokens from almost every box on the internet.

https://www.netscaler.com/blog/news/netscaler-investigation-recommendations-for-cve-2023-4966/

NetScaler Investigation Recommendations for CVE-2023-4966

Customer-managed NetScaler ADC and NetScaler Gateway are vulnerable to session hijacking. Find our recommendations here.

NetScaler Blog

Multi agency advisory on #CitrixBleed. Patch.

Lots of new IOCs in this. Boeing provided a detailed play by play of their LockBit incident. https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-325a

Why you should sweep your network for #CitrixBleed IOCs. A foot doctor.

CISA have held a briefing call with reporters about #CitrixBleed.

They have warned more than 300 US entities through CISA’s Ransomware Vulnerability Warning Program that they have problems and say thousands of systems remain vulnerable.

https://therecord.media/citrix-bleed-bug-targeted-cisa

‘Citrix Bleed’ vulnerability targeted by nation-state and criminal hackers: CISA

The bug has caused alarm for weeks as cybersecurity experts warned that many government agencies and major companies were leaving their appliances exposed to the internet — opening themselves up to attacks.

@GossiTheDog They're so lucky the ransomware actors will be off for Thanksgiving this week.

@GossiTheDog actually just downloaded @cisacyber's full write up on it. It's... A doozy. 😬

(PS: ...I was so nervous that I tagged a satire account instead of actual CISA with the "bird.makeup" server that I just went down a very hilarious rabbithole of "screw Twitter" verification that it was, in fact, an actual server and not some odd beauty influencer parody community for people who think birds need makeup.

...Which would be cool, now that I think about it, but was not in keeping with my desired comment...?

Anyway, have a great one! 😁😅)

@GossiTheDog While yes I understand this vuln has been out for a minute, it cannot be overstated how awesome CISA's program is.
@GossiTheDog some of the IoCs are so high fidelity, it's hard to believe that the TAs don't even change filenames from time to time. But many orgs still don't have the means to work with these indicators to catch an intruder.
And a lot still don't care as well, and got bitten by this wave.

@jonas @GossiTheDog I'm tired of seeing procdump.exe in these reports. Every. Single. Time.

I tried to make IOCs out of file hashes but there seems to be an infinite number of versions of procdump. I tried using the signing cert but Sysinternals sign a whole lot of other tools. We need a generic option.

@GossiTheDog Blocking all anydesk would've paid dividends here
@GossiTheDog Why didn't the patch be configured to also void all existing logins?