GreyNoise tracks massive Citrix Gateway recon using 63K+ residential proxies and AWS
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是GreyNoise监测到一个针对Citrix Gateway的大规模侦察活动。攻击者使用了超过63,000个住宅代理和AWS基础设施。时间范围是从1月28日到2月2日,2026年。 攻击分为两个阶段:第一阶段用住宅代理发现登录面板,第二阶段用AWS快速枚举暴露的版本。总共进行了111,834次会话,79%的目标是Citrix Gateway蜜罐,说明是有针对性的基础设施测绘,而不是随机扫描。 攻击者还用了Azure的一个大IP和许多合法的消费者IP,每个IP都有独特的浏览器指纹,以绕过地理限制和声誉过滤。版本检查用了AWS的六个小时,来自十个IP,使用旧的Chrome指纹。 TCP分析显示不同的基础设施设置但共享相同的工具框架。报告指出这可能是在攻击前进行基础设施测绘,并建议组织监测异常行为和加强防御措施。 总结时要包括GreyNoise、大规模侦察、63K+住宅代理、AWS、Citrix Gateway、登录面板、版本枚举以及针对性攻击的特点。确保在100字以内。 </think> GreyNoise监测到针对Citrix Gateway的大规模侦察活动,攻击者利用63,000多个住宅代理和AWS基础设施发现登录面板并枚举版本。活动涉及111,834次会话,79%针对Citrix蜜罐,表明有针对性的基础设施测绘而非随机扫描。 2026-2-4 14:49:36 Author: securityaffairs.com(查看原文) 阅读量:0 收藏

GreyNoise tracks massive Citrix Gateway recon using 63K+ residential proxies and AWS

Pierluigi Paganini February 04, 2026

GreyNoise spotted a dual-mode Citrix Gateway recon campaign using 63K+ residential proxies and AWS to find login panels and enumerate versions.

Between Jan 28 and Feb 2, 2026, GreyNoise tracked a coordinated reconnaissance campaign targeting Citrix ADC and NetScaler Gateways. Attackers used over 63,000 residential proxies to discover login panels, then switched to AWS infrastructure to aggressively enumerate exposed versions across more than 111,000 sessions.

The activity logged 111,834 sessions from over 63,000 IPs, with 79% aimed at Citrix Gateway honeypots, pointing to targeted infrastructure mapping rather than random crawling.

“The numbers tell the story: 111,834 sessions, 63,000+ unique source IPs, and a 79% targeting rate against Citrix Gateway honeypots specifically.” reads the report published by GreyNoise. “That last number matters—it’s well above baseline scanning noise, indicating deliberate infrastructure mapping rather than opportunistic crawling.”

Two related campaigns targeted Citrix infrastructure just before February 1, 2026. One scanned the web to find login panels, while the other quickly checked software versions, showing a coordinated reconnaissance effort.

The login discovery relied heavily on residential proxies. Attackers used one large Azure IP for a big chunk of traffic, but the rest came from thousands of legitimate consumer IPs worldwide. Each IP had a unique browser fingerprint, helping them bypass geofencing and reputation filters.

The version check ran over six hours from 10 AWS IPs using the same old Chrome fingerprint. The rapid, focused activity suggests the attackers acted fast after finding potential targets.

The Azure scanner routed traffic through VPNs and tunnels with a slightly smaller-than-normal MSS, showing careful operational security. Residential proxies came from Windows devices but passed through Linux proxies, blending consumer traffic. AWS version scanners used jumbo frame settings only possible in datacenters, confirming they relied on dedicated infrastructure rather than consumer networks.

TCP analysis shows different infrastructure setups but a shared framework: Azure traffic used VPN tunnels, residential scans went through Linux proxies, and AWS scans required datacenter-level network settings. All shared TCP traits indicate the same underlying tools across campaigns.

“Despite different infrastructure types, all fingerprints share identical TCP option ordering, which is an indicator of common tooling or framework underneath the operational compartmentalization.” continues the report.

The reconnaissance likely maps Citrix infrastructure before attacks, targeting EPA setup files for potential exploits. Organizations should monitor unusual user agents, rapid login enumeration, outdated browser fingerprints, and external access to sensitive paths. Defense includes limiting exposure, enforcing authentication, suppressing version info, and flagging suspicious regional traffic.

“This reconnaissance activity likely represents infrastructure mapping before exploitation. The specific targeting of the EPA setup file path suggests interest in version-specific exploit development or vulnerability validation against known Citrix ADC weaknesses.” concludes the report that includes Indicators of Compromise (IoCs).

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Citrix)




文章来源: https://securityaffairs.com/187615/hacking/greynoise-tracks-massive-citrix-gateway-recon-using-63k-residential-proxies-and-aws.html
如有侵权请联系:admin#unsafe.sh