Malicious actors recently exploited a Citrix vulnerability to steal active directory data from a critical infrastructure organization, the Cybersecurity and Infrastructure Security Agency reported recently, urging organizations to take certain steps to detect a potential system compromise and apply patches.

鈥淭his serious vulnerability in the very commonly used Citrix/Netscaler Application Delivery Controller was unknown prior to exploitation,鈥 said John Riggi, AHA鈥檚 national advisor for cybersecurity and risk. 鈥淎ccording to security researchers, the vulnerability may be associated with a Chinese government espionage campaign targeting critical infrastructure and allows hackers to access key network resources, such as active directory, and remotely execute malicious code. It is recommended that organizations using this service upgrade to the latest version of Netscaler ADC and Netscaler Gateway and patch according to bulletin CVE-2023-3467. The implementation of phishing-resistant multi-factor authentication also is highly recommended as a baseline security practice to help mitigate the risk of this and all other cyberattacks.鈥

For more information on this or other cyber and risk issues, contact Riggi at鈥. For the latest cyber and risk resources and threat intelligence, visit鈥aha.org/cybersecurity

Related News Articles

Headline
The Cybersecurity and Infrastructure Security Agency April 17 released guidance to reduce risks associated with a reported breach of Oracle cloud services.鈥
Headline
The National Counterintelligence and Security Center, the FBI, and the Defense Counterintelligence and Security Center yesterday released guidance on鈥
AHA Cyber Intel
While the rate of cyberattacks on hospitals has risen dramatically, the severity of the impacts has also grown exponentially. Let鈥檚 look at the state of cyber鈥
Headline
The House Energy and Commerce Oversight and Investigations Subcommittee April 1 discussed cybersecurity threats in legacy medical devices during a hearing. The鈥
Headline
The Trump Administration March 28 announced that it renewed for one year the public emergency for ongoing malicious cyber-enabled activities against the U.S.鈥
Headline
The FBI March 26 advised that, after extensive investigation and intelligence review, they have not identified any specific credible threat targeted against鈥