Brutkey

Kevin Beaumont
@GossiTheDog@cyberplace.social
Kevin Beaumont
@GossiTheDog@cyberplace.social

Update on the situation at The Hague and the shutdown of the Dutch Public Prosecution Service internet access, NCSC Netherlands issued an update today saying all orgs should hunt for CitrixBleed 2 activity, citing my blog.

They also advise clearing all session types, not just the ones Citrix say in their security advisory.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0196

Kevin Beaumont
@GossiTheDog@cyberplace.social
Kevin Beaumont
@GossiTheDog@cyberplace.social

Here’s the Dutch gov letter and my translation.

Kevin Beaumont
@GossiTheDog@cyberplace.social

The Dutch Public Prosecution Office have shut down their Citrix Netscaler and removed all internet access, Dutch media speculating CitrixBleed 2 exploitation.

https://www.techzine.eu/news/security/133163/dutch-department-of-justice-offline-after-citrix-vulnerability/

Justice minister David van Weel told MPs in a briefing that it appears the weakness had been used by third parties to access the department systems.

The justice ministry said the department had applied Citrix’s recommended patches, but these failed to fully eliminate the flaw.
https://www.dutchnews.nl/2025/07/prosecution-department-goes-offline-due-to-software-weakness/

Kevin Beaumont
@GossiTheDog@cyberplace.social

Again to reiterate the point in the thread - Citrix’s patching instructions don’t include - for example - resetting AAA sessions when AAA cookies are stealable with the vulnerability. So we’re going to see orgs caught with Citrix’s pants down.

Kevin Beaumont
@GossiTheDog@cyberplace.social

The Dutch Public Prosecution Office have shut down their Citrix Netscaler and removed all internet access, Dutch media speculating CitrixBleed 2 exploitation.

https://www.techzine.eu/news/security/133163/dutch-department-of-justice-offline-after-citrix-vulnerability/

Justice minister David van Weel told MPs in a briefing that it appears the weakness had been used by third parties to access the department systems.

The justice ministry said the department had applied Citrix’s recommended patches, but these failed to fully eliminate the flaw.
https://www.dutchnews.nl/2025/07/prosecution-department-goes-offline-due-to-software-weakness/

Kevin Beaumont
@GossiTheDog@cyberplace.social

This bit is still incomplete in the patching instructions btw - if it's a HA pair you need to additionally reset other session types or you're still vulnerable to session hijack after patching.

I'm still trying to get Citrix to update the instructions.

Kevin Beaumont
@GossiTheDog@cyberplace.social

we gettin' there!

Kevin Beaumont
@GossiTheDog@cyberplace.social

With the #CitrixBleed2 patch data I publish it's possible to view the history on Github for each new scan and see when hosts change from vuln to patched.

It's proving incredibly effective at getting orgs to patch. I tried private notifications via HackerOne and such for CitixBleed1 in 2023 and it took months to get orgs to patch. Putting the data public brings accountability for orgs who later get breached - so there's a rush to patch.

It's definitely interesting and may need a scale out.

Kevin Beaumont
@GossiTheDog@cyberplace.social

Citrix have a blog out about hunting for #CitrixBleed2

https://www.netscaler.com/blog/news/evaluating-netscaler-logs-for-indicators-of-attempted-exploitation-of-cve-2025-5777/

It's what was in my earlier blog - look for invalid characters in the username field and duplicate sessions with different IPs

Kevin Beaumont
@GossiTheDog@cyberplace.social

Personally I think Co-op did a really good job getting out of that situation and minimising impact.

I definitely think if you have a LAPSUS$ style advanced persistent teenagers situation, tilt towards open and honest comms as those kids will use secrecy against ya. It’s 2025, it’s okay to say you got hacked, people largely understand. Also, in IR, lawyers are usually stuck in 1980 advice - it’s just advice, they ain’t yo boss.

Kevin Beaumont
@GossiTheDog@cyberplace.social

The people arrested as part of the Co-op and M&S hack investigation have been released on bail.

https://nation.cymru/news/four-people-bailed-after-arrests-over-cyber-attacks-on-ms-co-op-and-harrods/

Previously when this happened with LAPSUS$, they just continued hacking stuff.

Kevin Beaumont
@GossiTheDog@cyberplace.social

With the #CitrixBleed2 patch data I publish it's possible to view the history on Github for each new scan and see when hosts change from vuln to patched.

It's proving incredibly effective at getting orgs to patch. I tried private notifications via HackerOne and such for CitixBleed1 in 2023 and it took months to get orgs to patch. Putting the data public brings accountability for orgs who later get breached - so there's a rush to patch.

It's definitely interesting and may need a scale out.