UPDATED 21:47 EDT / JANUARY 27 2020

SECURITY

Patch now: Critical flaw in Citrix actively targeted by hackers

Hackers are actively targeting a critical flaw in software from Citrix Systems Inc. first uncovered last month, and users are being warned that even if they patch now, their systems may still be compromised.

Formally known as CVE-2019-19781, the flaw exposes networks using the Citrix Application Delivery Controller and Gateway products to unauthorized access and hacking.

Citrix released a permanent final fix for all products affected by vulnerability on Friday after releasing a number of product-specific patches previously. It’s encouraging all Citrix users to install the fixes as soon as possible.

Although the patches’ availability for all affected products is a positive, they could prove too late for some who may have had their systems already compromised and don’t realize it.

Various cases have now been detected of hackers installing cryptomining malware and ransomware, in particular, Ragnarok. But in some cases, it was also discovered that hackers had installed back doors in infected systems, giving them access to targets in the future even when the patch has been applied.

“I fully expect that in coming months we will learn about several more organizations who were hacked last week but currently don’t realize this,” Craig Young, computer security researcher for Tripwire Inc.’s vulnerability and exposure research team, told SiliconANGLE. “Attackers may spend weeks to months spreading out over a network before crippling it with ransomware, draining bank accounts through wire transfer fraud, or selling off stolen data in bulk.”

Despite the ongoing risks, Citrix users should absolutely install the patches if they haven’t done so already, since hackers are actively scanning Citrix installations for targets.

Exactly how many Citrix installs remain unpatched is not entirely clear, although Bleeping Computer reported Sunday that the GDI Foundation found 98,000 vulnerable Citrix endpoints exposed online.

Citrix users who are unsure are if they are compromised are being encouraged to use the free Indicator of Compromise Scanning tool released by Citrix and FireEye Mandiant last week.

“The free tool, available under the Apache 2.0 open source license, provides customers with increased awareness of potential compromise related to the CVE-2019-19781 vulnerability on their systems,” Citrix said in a blog post. “The tool is designed to allow customers to run it locally on their Citrix instances and receive a rapid assessment of potential Indicators of Compromise based on known attacks and exploits.”

Photo: Citrix/Flickr

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU