Threat actors are continuing to attack a critical 9.8 vulnerability in unpatched NetScaler Gateways and then insert malicious scripts into the HTML content of the authentication web page to capture user credentials.The vulnerability — CVE-2023-3519 — was first reported in July when the Cybersecurity and Infrastructure Security Agency (CISA) put the bug on its Known Exploited Vulnerabilities (KEV) catalog.CISA said in its July advisory that in June of this year, threat actors exploited the bug as a zero-day to drop a Webshell on a critical infrastructure organization’s non-production environment NetScaler ADC appliance. The Webshell let the threat actors perform discovery on the victim’s Active Directory (AD) and exfiltrate AD data. CISA said the actors attempted to move laterally to a domain controller, but network segmentation controls for the appliance blocked any movement.Other attacks were reported on in August, and on Oct. 6, IBM’s X-Force reported that they observed a new malicious campaign that targeted NetScaler devices in an attempt to steal user credentials.“The campaign is another example of increased interest from cyber criminals in credentials,” wrote the X-Force researchers. “The 2023 X-Force cloud threat report found that 67% of cloud-related incident response engagements were associated with the use of stolen credentials.”While public reporting has highlighted how various threat actors have exploited these vulnerabilities, including suspected Chinese threat actors and the financially motivated FIN8, X-Force said it has not observed follow-on activity and was unable to attribute this recent campaign at this time.
Network Security, Identity
Attacks on NetScaler Gateways aim for user credentials

(Adobe Stock)
An In-Depth Guide to Network Security
Get essential knowledge and practical strategies to fortify your network security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds