‘Advanced’ hacker seen exploiting Cisco, Citrix zero-days

Amazon said it uncovered a sophisticated campaign targeting previously unknown vulnerabilities in products from Cisco and Citrix.

CJ Moses, CISO of Amazon Integrated Security, said they identified an “advanced” threat actor exploiting previously undisclosed zero-day vulnerabilities in Cisco Identity Service Engine (ISE) and Citrix systems. 

An Amazon spokesperson said the campaign, which was not attributed to any specific nation-state or cybercriminal group, was discovered in May. They declined to answer further questions about the nature of the targeting and the goal of the campaign. 

The hackers notably used custom malware and were exploiting CVE-2025-5777 — now known colloquially as “Citrix Bleed Two” — before it was disclosed publicly in July. 

“Through further investigation of the same threat exploiting the Citrix vulnerability, Amazon Threat Intelligence identified and shared with Cisco an anomalous payload targeting a previously undocumented endpoint in Cisco ISE,” Moses explained.

Cisco Identity Services Engine (ISE) is a network access control and security policy enforcement platform that allows companies to determine who can access what parts of a system based on their identity. 

The Cisco vulnerability, designated as CVE-2025-20337 in June, provided hackers with administrator-level access to compromised systems.

“What made this discovery particularly concerning was that exploitation was occurring in the wild before Cisco had assigned a CVE number or released comprehensive patches across all affected branches of Cisco ISE,” Moses added. “This patch-gap exploitation technique is a hallmark of sophisticated threat actors who closely monitor security updates and quickly weaponize vulnerabilities.”

He noted that their findings illustrate a trend of threat actors focusing on critical identity and network access control infrastructure — the systems enterprises rely on to enforce security policies and manage authentication across their networks.

For the attacks involving Cisco, Moses said the hackers used custom-built backdoors specifically made for Cisco ISE environments. 

The backdoor has sophisticated evasion capabilities and left minimal forensic artifacts. The threat actors were exploiting both CVE-2025-20337 and CVE-2025-5777 as zero-days but were using them indiscriminately when Amazon discovered the campaign.

“The access to multiple unpublished zero-day exploits indicates a highly resourced threat actor with advanced vulnerability research capabilities or potential access to non-public vulnerability information,” Moses said.

Citrix Bleed Two caused alarm over the summer, so much so that federal agencies were given a one-day deadline to patch it. The bug affects Citrix customers who manage their own NetScaler ADC and NetScaler Gateway appliances.

Experts noted that one of the IP addresses tied to exploitation of the bug was linked to the RansomHub ransomware group by CISA last year. The bug was allegedly used to target the Office of the Attorney General of Pennsylvania as well as the Netherlands’ Public Prosecution Service — the country’s equivalent of the U.S. Justice Department.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

German extremist arrested over operating alleged darknet assassination marketplace

Next Post

Google files lawsuit to disrupt massive ‘Lighthouse’ smishing scheme

Related Posts

Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

A critical security flaw has been disclosed in LangChain Core that could be exploited by an attacker to steal sensitive secrets and even influence large language model (LLM) responses through prompt injection. LangChain Core (i.e., langchain-core) is a core Python package that's part of the LangChain ecosystem, providing the core interfaces and model-agnostic abstractions for building
Read More

“Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

Cybersecurity researchers have shed light on a cybercriminal group called Jingle Thief that has been observed targeting cloud environments associated with organizations in the retail and consumer services sectors for gift card fraud. "Jingle Thief attackers use phishing and smishing to steal credentials, to compromise organizations that issue gift cards," Palo Alto Networks Unit 42 researchers
Read More

Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain

Cybersecurity researchers have shed light on a previously undocumented threat actor called TA585 that has been observed delivering an off-the-shelf malware called MonsterV2 via phishing campaigns. The Proofpoint Threat Research Team described the threat activity cluster as sophisticated, leveraging web injections and filtering checks as part of its attack chains. "TA585 is notable because it
Read More