Saturday, January 25, 2025
HomeData BreachCitrix Internal Network Hacked and Access the Most Sensitive Data for 6...

Citrix Internal Network Hacked and Access the Most Sensitive Data for 6 Month by Unknown Hackers

Published on

SIEM as a Service

Follow Us on Google News

Citrix finally confirms that the cybercriminals successfully compromised their internal network and accessed the most sensitive files also they removed from their network during the security breach that reported in March.

Citrix Systems, Inc.a well-known software company that provides server, application, and desktop virtualization, networking, software as a service, and cloud computing technologies for NASA, FBI, etc.

Citrix experienced a massive data breach and the company were believed that the attackers may have stolen at least 6 TB to 10 TB of data.

In March when FBI notified to Citrix regarding this incident that they believed that Iran-base organized cybercrime group called Iridium who may have stolen at least 6-10 TB of highly sensitive data that belongs to the project data of aerospace industry, the FBI, NASA, and Saudi Arabia’s state-owned oil company.

During the attack, threat actors leveraged a combination of tools, techniques, and procedures, allowing them to conduct targeted network intrusion to access The internal network.

After this incident learned by Citrix, they deployed the security experts and immediately launched an investigation.

In this case, FBI was claimed that Citrix Hacked by international cyber criminals who have gained access to the internal system and stole the sensitive business documents.

Now, Citrix Released a new statement that named as “Notice of Data Breach” to Office of the Attorney General and all the Citrix employees who were suffered by this data breach.

Based on the investigation report, Citrix confirmed that the cybercriminals had intermittent access to our network between October 13, 2018, and March 8, 2019, and that they removed files from Citrix internal systems.

Stolen data contains current and former employees and, in limited cases, information about beneficiaries and/or dependents including names, Social Security numbers, and financial information.

“In order to find out the solution and future prevention Citrix have engaged leading cyber security firms to assist our internal team with its forensic investigation, and also cooperating with the FBI in connection with their investigation of the cyber criminals”, Peter Lefkowitz, Chief Privacy and Digital Risk Officer said.

Additionally, and as a precaution, we have arranged for you, at your option, to enroll in Equifax ID Patrol, a complimentary one-year credit monitoring, dark web monitoring, and identity restoration service. You have until August 31, 2019, to activate the free, Citrix added in their statement.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.

Also Read:

Most Hacked Passwords – Top 100,000 Common Passwords that Already Known to Hackers

Wipro Security Breach – Employees’ accounts Hacked Through Advanced Phishing Campaign

Docker Hub Hacked – Hackers Gained Access to 190,000 Users Accounts


Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Salt Typhoon Hacked Nine U.S. Telecoms, Tactics and Techniques Revealed

Salt Typhoon, a state-sponsored Advanced Persistent Threat (APT) group linked to the People's Republic...

BASHE Ransomware Allegedly Leaked ICICI Bank Customers Data

A major cyber threat looms over Indian financial giant ICICI Bank as the notorious...

Threat Actor IntelBroker Allegedly Claiming Breach of Hewlett Packard Enterprise Data

A threat actor known as IntelBroker has taken to a prominent dark web forum...