Thursday, March 28, 2024

Citrix Internal Network Hacked and Access the Most Sensitive Data for 6 Month by Unknown Hackers

Citrix finally confirms that the cybercriminals successfully compromised their internal network and accessed the most sensitive files also they removed from their network during the security breach that reported in March.

Citrix Systems, Inc.a well-known software company that provides server, application, and desktop virtualization, networking, software as a service, and cloud computing technologies for NASA, FBI, etc.

Citrix experienced a massive data breach and the company were believed that the attackers may have stolen at least 6 TB to 10 TB of data.

In March when FBI notified to Citrix regarding this incident that they believed that Iran-base organized cybercrime group called Iridium who may have stolen at least 6-10 TB of highly sensitive data that belongs to the project data of aerospace industry, the FBI, NASA, and Saudi Arabia’s state-owned oil company.

During the attack, threat actors leveraged a combination of tools, techniques, and procedures, allowing them to conduct targeted network intrusion to access The internal network.

After this incident learned by Citrix, they deployed the security experts and immediately launched an investigation.

In this case, FBI was claimed that Citrix Hacked by international cyber criminals who have gained access to the internal system and stole the sensitive business documents.

Now, Citrix Released a new statement that named as “Notice of Data Breach” to Office of the Attorney General and all the Citrix employees who were suffered by this data breach.

Based on the investigation report, Citrix confirmed that the cybercriminals had intermittent access to our network between October 13, 2018, and March 8, 2019, and that they removed files from Citrix internal systems.

Stolen data contains current and former employees and, in limited cases, information about beneficiaries and/or dependents including names, Social Security numbers, and financial information.

“In order to find out the solution and future prevention Citrix have engaged leading cyber security firms to assist our internal team with its forensic investigation, and also cooperating with the FBI in connection with their investigation of the cyber criminals”, Peter Lefkowitz, Chief Privacy and Digital Risk Officer said.

Additionally, and as a precaution, we have arranged for you, at your option, to enroll in Equifax ID Patrol, a complimentary one-year credit monitoring, dark web monitoring, and identity restoration service. You have until August 31, 2019, to activate the free, Citrix added in their statement.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.

Also Read:

Most Hacked Passwords – Top 100,000 Common Passwords that Already Known to Hackers

Wipro Security Breach – Employees’ accounts Hacked Through Advanced Phishing Campaign

Docker Hub Hacked – Hackers Gained Access to 190,000 Users Accounts


Website

Latest articles

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles