قالب وردپرس درنا توس
Home / Business / Citrix says the network was broken by international criminals

Citrix says the network was broken by international criminals



  The user window and password query window on a web page can be viewed on the screen of a laptop.
Magnify / The query window for username and password on a website can be seen at

Jens Büttner / Getty Images

Virtualization and software provider Citrix said the internal network was violated by international criminals most likely exploited weak passwords to gain limited access before working to gain more privileged control. 19659005] Announcement published Friday morning sent shock waves through security circles because Citrix products and services are used by more than 400,000 organizations worldwide, including 98 percent of Fortune 500. Citrix is ​​also widely used by governments and military. A break-in by foreign hackers entails the risk of delaying technical information that may damage the customer's network.

Citrix said it still does not know which specific data was stolen, but a first survey appears to show that the attackers may have obtained business documents. For now, company employees have said that there is no indication that the security of any Citrix product or service has been compromised. The company has started a forensic examination and engaged a security firm to assist. Citrix has also taken unspecified measures to better secure the internal network.

Citrix said it was contacted by the FBI on Wednesday and that the agency said it had reason to believe that the Citrix network was violated.

"While not confirmed, the FBI has announced that the hackers probably used a tactic known as password spraying, a technique that exploits weak passwords," said Friday's statement. "When they got a foothold with limited access, they worked to bypass further layers with security. reporting, and in an interview, Resecurity President Charles Yoo refused to provide details that would help external researchers confirm the report.

Citrix said the intrusion query "moves as quickly as possible to understand that these studies are complex, dynamic and requires time to do properly. "Until more details are available, it is too early to know the extent of the breach or its effect on customers.


Source link