Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Citrix Confirms Ongoing DDoS Attack Impacting NetScaler ADCs

Citrix Confirms Ongoing DDoS Attack Impacting NetScaler ADCs

Citrix has confirmed today that an ongoing ‘DDoS attack pattern’ using DTLS as an amplification vector is affecting Citrix Application Delivery Controller (ADC) networking appliances with EDT enabled.

Datagram Transport Layer Security (DTLS) is a communications protocol for securing delay-sensitive apps and services that use datagram transport.

DTLS is based on the Transport Layer Security (TLS) protocol and it is designed to prevent eavesdropping and tampering, and to protect data privacy.

Reports of the attack have started trickling in on December 21st, with customers reporting an ongoing DDOS amplify attack over UDP/443 against Citrix (NetScaler) Gateway devices.

Source: Marco Hofmann

Also Read: Limiting Location Data Exposure: 8 Best Practices

Small number of customers affected

“As part of this attack, an attacker or bots can overwhelm the Citrix ADC DTLS network throughput, potentially leading to outbound bandwidth exhaustion,” the company explained in a threat advisory published earlier today.

“The effect of this attack appears to be more prominent on connections with limited bandwidth.”

The scope of the attack is limited to just “a small number of customers” at the moment according to Citrix and it impacts all ADCs with Enlightened Data Transport UDP Protocol (EDT) enabled.

Furthermore, based on current evidence there are no known Citrix vulnerabilities being actively exploited in this ongoing attack.

If information on products vulnerable to DDoS attacks due to software bugs is discovered during this investigation, it will be published by the Citrix Security Response Team in a separate security advisory.

Update to remove attack vector under development

“Citrix is working on a feature enhancement in DTLS to eliminate the susceptibility to this attack,” the company added.

“Citrix expects to have this enhancement available on the Citrix downloads page for all supported versions on Jan 12, 2021.”

Customers impacted by this DDoS attack can temporarily mitigate it by temporarily disabling DTLS, the amplification vector used by the attackers.

To disable DTLS on your Citrix ADC you will have to issue the following command from the command line interface:

set vpn vserver -dtls OFF

“Disabling the DTLS protocol may lead to limited performance degradation to real time applications using DTLS in your environment,” Citrix added.

Also Read: 10 Practical Benefits of Managed IT Services

“The extent of degradation depends on multiple variables. If your environment does not use DTLS, disabling the protocol temporarily will have no performance impact.”

Customers who can’t immediately disable DTLS in their environment are advised to reach out to Citrix Technical Support.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us