<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=363521274148941&amp;ev=PageView&amp;noscript=1">
Blog

Cyderes Advisory

Mitigating Brute Force Attacks on NetScaler Devices

Article contributed by Ethan Fite

 

In recent weeks, Cyderes has observed a significant uptick in brute force attacks targeting Citrix NetScaler devices, across multiple client environments.

These attacks, emanating primarily from a cloud provider based in Hong Kong, exploit misconfigured or outdated systems. They coincide with recent critical vulnerability disclosures affecting Citrix NetScaler, underscoring the urgent need for organizations to act decisively to protect their infrastructure.

 

Overview of the Threat

Attackers are leveraging a distributed brute force strategy, often changing IP addresses and Autonomous System Numbers (ASNs) with each attempt, making detection and mitigation challenging.

Notably, attacks appear to spike in proximity to new vulnerability disclosures, such as the ones identified in November 2024:

 

CVE-2024-8534: Improper access control leading to authenticated users gaining unintended access.

CVE-2024-8535: Potential for privilege escalation under specific conditions.

 

These vulnerabilities have been detailed by Citrix in their security bulletin, and should serve as a catalyst for immediate action by affected organizations.

 

IP Blocks Associated with Attacks

Below is a list of IP addresses and ranges implicated in the current wave of brute force attempts:

 

45.145.4.0/24

45.8.227.246

212.87.223.3

185.92.182.129

185.92.180.100

185.92.180.185

185.92.182.172

185.92.182.0/24

185.92.180.0/24

194.113.37.91

185.92.182.174

185.92.182.86

46.8.227.238

46.8.227.171

194.113.37.0/24

212.87.223.207

194.113.37.116

212.87.223.170

45.159.209.0/24

194.113.37.214

212.87.223.78

194.113.37.193

46.8.227.71

188.130.207.178

193.242.145.120

194.113.37.180

212.87.223.140

95.182.96.42

109.120.136.0/24

193.124.254.0/24

208.115.218.90

 

Recommended Actions

To counteract these threats, Cyderes recommends the following proactive measures:

 

1) Block High-Risk IP Ranges

Many of these attacks originate from IP blocks associated with the Hong Kong-based cloud provider. Blocking these ranges via firewalls or network policies can reduce exposure. A comprehensive list of IP ranges is available at IPInfo.


2) Patch and Upgrade NetScaler Devices

  • If you are running an End-of-Life (EoL) version of NetScaler, upgrade immediately to a supported release. Neglected deployments are common, but they remain highly vulnerable.

  • For supported versions, apply the latest security patches, especially those addressing CVE-2024-8534 and CVE-2024-8535.


3) Validate Configurations

  • Ensure that the Remote Desktop Protocol (RDP) feature is configured securely. Disable it entirely if not needed.

  • Regularly review access control policies and user authentication mechanisms.


4) Implement Geographic Blocking

Block traffic from high-risk or unnecessary geographic locations. If Hong Kong or other high-threat regions are not part of your operational footprint, consider blocking traffic entirely.

 

5) Monitor for Anomalous Activity

Use tools to identify spikes in failed login attempts or traffic anomalies. Attackers are using sophisticated tactics, including shifting ASNs and IPs.

 

6) Engage with Cyderes

Cyderes can assist in implementing architectural changes, monitoring ongoing attacks, and providing expert advice on hardening your NetScaler deployments.

 

Conclusion

Brute force attacks and vulnerability exploitation campaigns are a persistent threat, particularly against neglected or unpatched systems. These attacks highlight the importance of staying vigilant in monitoring, patching, and securing your infrastructure. By acting promptly, organizations can mitigate risk and maintain operational integrity.

Cyderes is committed to helping clients navigate these complex threats. If you need assistance securing your NetScaler devices or defending against other sophisticated cyberattacks, contact us today.

 


 

Ready to put these insights into practice and improve your ongoing security posture?

 

For more cybersecurity tips, follow Cyderes on LinkedIn and X.