Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

05:55 PM

Citrix Breach Underscores Password Perils

Attackers used a short list of passwords to knock on every digital door to find vulnerable systems in the vendor's network.

The recent cyberattack on enterprise technology provider Citrix Systems using a technique known as password spraying highlights a major problem that passwords pose for companies: Users who select weak passwords or reuse their login credentials on different sites expose their organizations to compromise.

On March 8, Citrix posted a statement confirming that the company's internal network had been breached by hackers who had used password spraying, successfully using a short list of passwords on a wide swath of systems to eventually find a digital key that worked. The company began investigating after being contacted by the FBI on March 6, confirming that the attackers appeared to have downloaded business documents. 

Password spraying and credential stuffing have become increasingly popular, so companies must focus more on defending against these types of attacks, according to Daniel Smith, head of threat research at Radware.

"Actors will use password spraying [instead of] brute force attacks to avoid being timed out and possibly alerting admins," Smith said in a statement. "Once the user is compromised the actors will then employ advanced techniques to deploy and spread malware to gain persistence in the network."

While brute-force attacks against a single system are easy to detect, password spraying spreads the attack out over many systems and over time. By spreading the attempts, the brute-force password attack can escape notice if companies don't connect related security events across the network. 

Authentication Attacks

Attacks based on authentication have become a top concern for companies. In its recent report, security firm Rapid7 found that four of the top five security events detected in its clients' networks in 2018 involved authentication. Often the attacker is only caught because they are attempting to log in from a computer not related to the company.

While password spraying typically uses a list of common passwords, in many cases, attackers will use passwords leaked from other breaches, hoping that employee reuse their passwords at work. A list of the top-1,000 passwords is effective 75% of the time, according to the U.K.'s National Cyber Security Centre

The agency recommends that companies deploy technologies that have proven effective against password-spraying attacks, use multi-factor authentication, and regularly audit employees' passwords against a list of the top-1000 or 10,000 most popular passwords.

For companies that base their security on workers' credentials, detecting an attacker is difficult because the rogue user has successfully logged in.

"It is a non-trivial problem," says Troy Hunt, an independent expert on cyber- and password security. "We are asking companies to detect a legitimate username-password credential as an attack."

Because Citrix provides a variety of services to companies, including a popular remote access service, the attackers could use it as a step into other companies, Radware's Smith said.

"Nation states actors typically target MSP (managed service providers) and companies like Citrix due to their client base and intellectual property," he said. "Other than espionage or financial profit, MSPs can also be targeted and leveraged in supply chain attacks that are used as a staging point to distribute additional malware."

Citrix has committed to updating its customers on the breach. In addition to its forensics investigation in conjunction with a third-party firm, the company further secured its internal network and is cooperating with the FBI, Citrix's Black said in his post last week.

Resecurity emerges with details

Citrix and the FBI are not the only two organizations that appear to have details on the breach. Boutique security firm Resecurity claims that the attack against Citrix began on October 15, 2018, used a list of nearly 32,000 user accounts, and is connected to Iranian interests. 

"The incident has been identified as a part of a sophisticated cyber-espionage campaign supported by nation-state (sic) due to strong targeting on government, military-industrial complex, energy companies, financial institutions and large enterprises involved in critical areas of economy," the company stated in an analysis posted on March 8, the same day as Citrix's statement. 

"Based our recent analysis, the threat actors leveraged a combination of tools, techniques and procedures (TTPs) allowing them to conduct targeted network intrusion to access at least 6 terabytes of sensitive data stored in the Citrix enterprise network, including e-mail correspondence, files in network shares and other services used for project management and procurement," the firm stated.

Resecurity claimed that its researchers notified Citrix of the breach in December, linking the attack to a known Iranian operator IRIDIUM. Citrix, however, declined to comment further on its investigation into breach or whether it was contacted by Resecurity.

"We are focused on the comprehensive forensic investigation into the incident that we are conducting with leading third-party experts and have no comment on Resecurity’s report or claims," a company spokesperson said. 

While claiming to be trusted by Amazon, Microsoft, Eurosport, and JP Morgan, among others, Resecurity has apparently only recently emerged from stealth. The Los Angeles, Calif., startup only has two analyses posted, including the Citrix breach, with press releases dating back only to September 2018. The company has not returned a request for comment from Dark Reading.

Related Content:



Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
The Governance Guru
The Governance Guru,
User Rank: Strategist
3/12/2019 | 10:47:27 PM
Great synopsis of a complex yet commonplace issue
Great summary of the issue. Password spraying is definitely the new way of bypassing the defences built to protect against brute-force attacks. The sophistication of this attack shows how far malicious actors are willing to go to get to their goal. 
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google Maps is taking "interactive" to a whole new level!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-17
A heap based buffer overflow vulneraibility exists in GNU LibreDWG 0.10 via bit_calc_CRC ../../src/bits.c:2213.
PUBLISHED: 2021-05-17
A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_compressed_section ../../src/decode.c:2417.
PUBLISHED: 2021-05-17
A heap based buffer overflow vulnerability exits in GNU LibreDWG 0.10 via: read_2004_section_classes ../../src/decode.c:2440.
PUBLISHED: 2021-05-17
A null pointer deference issue exists in GNU LibreDWG 0.10 via get_bmp ../../programs/dwgbmp.c:164.
PUBLISHED: 2021-05-17
A null pointer deference issue exists in GNU LibreDWG 0.10 via read_2004_compressed_section ../../src/decode.c:2337.