Categories: Cyber Security News

Hackers Actively Scan Citrix NetScaler Infrastructure to Identify Exposed Login Panels

A coordinated global reconnaissance campaign has been observed targeting Citrix ADC (NetScaler) Gateway infrastructure.

According to multiple security telemetry sources, attackers launched a massive scan aimed at discovering authentication panels and enumerating software versions, a strong sign of pre‑exploitation activity.

GreyNoise analysts reported the campaign generated 111,834 sessions originating from over 63,000 unique IP addresses, with 79% of that traffic specifically directed at Citrix Gateway honeypot systems.

This volume far exceeds normal background internet noise, confirming a deliberate reconnaissance operation rather than opportunistic scanning.

Phased Reconnaissance Using Residential Proxies

The campaign operated in two distinct phases. The first, dubbed the Login Panel Discovery Phase, recorded over 109,942 scanning sessions attempting connections to the /logon/LogonPoint/index.html login page.

Two Campaigns, One Target

Researchers found that 64% of IPs came through residential proxies spread across countries, including Vietnam, Argentina, Mexico, Algeria, and Iraq.

These proxies were particularly effective at bypassing IP reputation filters and geoblocking, since their addresses appeared as legitimate consumer ISP endpoints.

Interestingly, a single Microsoft Azure IP based in Canada accounted for 36% of requests, all tagged with a Prometheus blackbox‑exporter user agent.

Each IP in the proxy rotation carried unique browser fingerprints and user‑agent strings, further complicating attribution and correlation.

The second stage, a Version Disclosure Phase on February 1, 2026, saw ten AWS instances conduct a concentrated six‑hour scanning burst.

These systems fired 1,892 requests to the /epa/scripts/win/nsepa_setup.exe path to probe Citrix Endpoint Analysis (EPA) component versions. Traffic peaked at 362 sessions near 02:00 UTC, rapidly subsiding after 05:00 UTC.

Every AWS source used an outdated Chrome 50 user agent from 2016 and shared identical HTTP headers, suggesting a single actor orchestrating the scan through disposable cloud instances.

Mode Sessions Source IPs Infrastructure
Login Panel Discovery 109,942 63,189 Azure + Residential proxies
Version Disclosure 1,892 10 AWS us‑west‑1/us‑west‑2

GreyNoise investigators believe this activity is linked to reconnaissance supporting exploit development against known weaknesses in Citrix ADC and Gateway versions.

The sampling of EPA setup paths implies potential vulnerability validation or version‑specific exploit testing.

Recent Citrix vulnerabilities, such as CVE‑2025‑5777 (CitrixBleed 2) and CVE‑2025‑5775, a remote code execution flaw, have already been exploited in previous attacks.

Security teams should assume adversaries are mapping environments in preparation for similar campaigns.

Defenders are urged to:

  • Monitor for “blackbox‑exporter” user agents from unapproved sources.
  • Alert on HTTP requests to /epa/scripts/win/nsepa_setup.exe.
  • Track rapid enumeration attempts against /logon/LogonPoint/ paths.
  • Detect HEAD requests to Citrix Gateway endpoints.
  • Flag access patterns using antiquated browser fingerprints like Chrome 50.

Administrators should restrict internet exposure of Citrix Gateway systems, enforce authentication for the /epa/scripts/ directory, and remove banner or error message version disclosures.

Monitoring for connections from residential ISP ranges or unexpected geographies can further reduce reconnaissance visibility.

Indicators of Compromise (IOCs)

Version Disclosure – AWS:
44.251.121.190, 13.57.253.3, 50.18.232.85, 52.36.139.223, 54.201.20.56, 54.153.0.164, 54.176.178.13, 18.237.26.188, 54.219.42.163, 18.246.164.162

Login Panel – Azure:
52.139.3.76

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Hackers Actively Scan Citrix NetScaler Infrastructure to Identify Exposed Login Panels appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Spacelift Unleashes Infrastructure Teams From DevOps Gridlock

Spacelift has launched Spacelift Intelligence to help infrastructure teams escape drowning in provisioning requests. Developers…

16 minutes ago

Reco Tackles AI Agent Chaos With SaaS Security

Reco has released Reco AI Agent Security to fill the visibility gap for AI agents…

16 minutes ago

Sana from Workday launches AI Superintelligence to streamline business

Workday has announced a major evolution of its business platform, with the first update to…

17 minutes ago

Van Weelde Sets Sail with Unit4 ERPx Upgrade

Unit4 has announced that Van Weelde Shipping Group is one of the latest customers to…

17 minutes ago

Are We ‘Data Ready’ for AI or any Meaningful Process Transformation?

AI in all its forms (analytical, generative, agentic, et al) promises to redefine how work…

17 minutes ago

Xbox Will Finally Let You Disable Quick Resume for Specific Games, Such as Online Titles That It Just Doesn’t Play Nice With

Microsoft has announced a fresh set of system features, including the long-requested ability to disable…

17 minutes ago

This website uses cookies.