Iranian hackers believed behind big data breach at Citrix
Citrix Systems Inc. informed customers on Friday that the U.S. Federal Bureau of Investigation told the company that hackers gained access to its systems and stole data.
While not providing much in the way of details, Citrix said that it had taken “action to contain this incident,” including launching a forensic investigation as well as “taking actions to secure its network.”
After the initial revelation, more details of the hack have come to light. Security firm Resecurity International Inc. claimed that it reached out to both the FBI and Citrix when it became aware of the attack — that is, before it was publicly disclosed.
The research firm said an Iranian government-linked hacking group called IRIDIUM stole at least 6 terabytes of sensitive internal files stored in the Citrix enterprise network, including e-mail correspondence, files and other services used for project management and procurement.
“The incident has been identified as a part of a sophisticated cyberespionage campaign supported by nation-state due to strong targeting on government, military-industrial complex, energy companies, financial institutions and large enterprises involved in critical areas of economy,” Resecurity said in a blog post.
Resecurity initially claimed that attacks took place in December and as recently as Monday. But Resecurity President Charles Yoo later told NBC that the hackers may have broken into Citrix’s network about 10 years ago and have been “lurking inside the company’s system ever since.”
Citrix provides services to more than 400,000 companies and other organizations, including 98 percent of the Fortune 500.
Chris Morales, head of security analytics at Vectra Networks Inc., questioned why it took Citrix to become aware of the security breach via the FBI.
“The FBI as a source of breach notification happens far too often and it is unfortunate because once the FBI is aware, it is usually too late as exfiltration of information has already occurred,” Morales said. “While we often point to lack of maturity of security operations as to why a company would miss an attack, it is even more unfortunate when a security vendor is compromised that does have the skills and capabilities to defend against cyberattacks.”
Morales added that every company could stand to improve its level of network visibility. “As a security vendor, I know our own industry must practice the same vigilance we preach,” he said. “Even then, we must assume a breach can occur and be prepared to respond before information is stolen that can impact our clients.”
Photo: citrixsynergy/Flickr
Since you’re here …
… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.
If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.