itb-au logo
Story image

Was Citrix unaware of its own data breach until the FBI got involved?

14 Mar 2019

Technology giant Citrix found out about a breach in its internal network due to a tipoff from the FBI, the company says.

According to a blog post from Citrix’s CSIO Stan Black, the FBI contacted Citrix on March 6 and advised that international cybercriminals had allegedly gained access to Citrix’s internal network.

The FBI believes that the criminals most likely used a technique called ‘password spraying’, which is a kind of brute force attack that takes advantage of weak passwords. Once the criminals got in, they began moving further into the network.

“While our investigation is ongoing, based on what we know to date, it appears that the hackers may have accessed and downloaded business documents,” says Black.

“The specific documents that may have been accessed, however, are currently unknown. At this time, there is no indication that the security of any Citrix product or service was compromised.”

Once Citrix was alerted to the breach, it then contained the incident and took ‘actions to secure’ its internal network.

Forensic investigations and consultants from a cybersecurity firm were called in to help. Citrix says it continues to cooperate with the FBI.

According to cybersecurity firm Resecurity, the attack is linked to Iranian group IRIDIUM, which also conducted a number of attacks on other companies including government agencies, tech companies, and oil and gas companies.

The company posted a blog in which it outlines how the attacks likely occurred around October 15, 2018. Resecurity acquired the Global Access List related to the breach and found 31,378 records. 

“The threat actors leveraged it for further reconnaissance and accounts compromise,” the blog states.

In December 2018, Resecurity claims that it contacted Citrix to warn the company about a targeted attack and breach.

“Based our recent analysis, the threat actors leveraged a combination of tools, techniques and procedures (TTPs) allowing them to conduct a targeted network intrusion to access at least 6 terabytes of sensitive data stored in the Citrix enterprise network, including e-mail correspondence, files in network shares and other services used for project management and procurement.”

Citrix says it will have a better picture of the breach once it has what it believes is ‘credible and actionable information’.

“Citrix is moving as quickly as possible, with the understanding that these investigations are complex, dynamic and require time to conduct properly… details matter,” says Black.

“Citrix deeply regrets the impact this incident may have on affected customers. Citrix is committed to updating customers with more information as the investigation proceeds, and to continuing to work with the relevant law enforcement authorities.”

Story image
InterSystems helps Aus laboratories in the fight against COVID-19
"InterSystems is proud to be helping SydPath, Austech Medical Laboratories, Goulburn Valley Health Pathology and other clinical laboratories, and we will continue making additional resources available to customers dealing with the pandemic.”More
Story image
You're virtually invited: How the smartest organisations manage Office 365 and Microsoft Teams
If you’re starting your digital transformation journey or want to find out more about how you can boost your Office 365 productivity, this is your chance to take advantage of expert advice - free.More
Story image
BlackLine offers free finance and accounting services to help business get through COVID-19
BlackLine has made a number of its services complimentary as it looks at ways it can help accounting teams operate during the COVID-10 pandemic. More
Story image
74% of CFOs want staff to work from home permanently - Gartner
The report revealed that 74% CFOs and finance leaders intend to move at least 5% of their previously on-site workforce to permanently remote positions post-COVID 19.More
Story image
Microsoft Azure virtual desktop solution ideal for remote working, Empired states
Businesses should be considering connectivity and physical equipment when it comes to remote working plans. A tool such as WVD can help, Empired states.More
Story image
Interview: RSA explains security in the epoch of IT disruption
We discussed cybersecurity in terms of how it fits into business continuity, as well as the threat landscape, and what RSA is currently doing to assist businesses that need protection.More