Story image

Was Citrix unaware of its own data breach until the FBI got involved?

14 Mar 2019

Technology giant Citrix found out about a breach in its internal network due to a tipoff from the FBI, the company says.

According to a blog post from Citrix’s CSIO Stan Black, the FBI contacted Citrix on March 6 and advised that international cybercriminals had allegedly gained access to Citrix’s internal network.

The FBI believes that the criminals most likely used a technique called ‘password spraying’, which is a kind of brute force attack that takes advantage of weak passwords. Once the criminals got in, they began moving further into the network.

“While our investigation is ongoing, based on what we know to date, it appears that the hackers may have accessed and downloaded business documents,” says Black.

“The specific documents that may have been accessed, however, are currently unknown. At this time, there is no indication that the security of any Citrix product or service was compromised.”

Once Citrix was alerted to the breach, it then contained the incident and took ‘actions to secure’ its internal network.

Forensic investigations and consultants from a cybersecurity firm were called in to help. Citrix says it continues to cooperate with the FBI.

According to cybersecurity firm Resecurity, the attack is linked to Iranian group IRIDIUM, which also conducted a number of attacks on other companies including government agencies, tech companies, and oil and gas companies.

The company posted a blog in which it outlines how the attacks likely occurred around October 15, 2018. Resecurity acquired the Global Access List related to the breach and found 31,378 records. 

“The threat actors leveraged it for further reconnaissance and accounts compromise,” the blog states.

In December 2018, Resecurity claims that it contacted Citrix to warn the company about a targeted attack and breach.

“Based our recent analysis, the threat actors leveraged a combination of tools, techniques and procedures (TTPs) allowing them to conduct a targeted network intrusion to access at least 6 terabytes of sensitive data stored in the Citrix enterprise network, including e-mail correspondence, files in network shares and other services used for project management and procurement.”

Citrix says it will have a better picture of the breach once it has what it believes is ‘credible and actionable information’.

“Citrix is moving as quickly as possible, with the understanding that these investigations are complex, dynamic and require time to conduct properly… details matter,” says Black.

“Citrix deeply regrets the impact this incident may have on affected customers. Citrix is committed to updating customers with more information as the investigation proceeds, and to continuing to work with the relevant law enforcement authorities.”

Instagram: The next big thing in online shopping?
This week Instagram announced a new feature called checkout, which allows users to buy products they find on Instagram.
Apple's AirPods now come with 'Hey Siri' functionality
The new AirPods come with a standard case or a Wireless Charging Case that holds additional charges for more than 24 hours of listening time.
NZ investment funds throw weight against social media giants
A consortium of NZ funds managing assets worth more than $90m are appealing against Facebook, Twitter, and Google following the Christchurch terror attacks.
Poly appoints new A/NZ managing director, Andy Hurt
“We’re excited to be bringing together two established pioneers in audio and video technology to be moving forward and one business – Poly."
Unity and NVIDIA announce real-time ray tracing across industries
For situations that demand maximum photorealism and the highest visual fidelity, ray tracing provides reflections and accurate dynamic computations for global lighting.
NVIDIA announces Jetson Nano: A US$99 tiny, yet mighty AI computer 
“Jetson Nano makes AI more accessible to everyone, and is supported by the same underlying architecture and software that powers the world's supercomputers.”
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
NVIDIA introduces a new breed of high-performance workstations
“Data science is one of the fastest growing fields of computer science and impacts every industry."