A recent report confirms that unidentified threat actors broke into U.S. Census Bureau servers in early 2020 after exploiting a known dangerous vulnerability. A representative of this office mentions that the hackers were connected to the networks of the Decennial Census, although they could not access the information stored in these systems.
Still, a message from the Office of the Inspector General (OIG) notes that hackers managed to gain access to the agency’s servers used to allow employees to access the internal network remotely, activity that increased during the pandemic.
Although OIG officials wrote the name of the server vendor in their report, other information included in the document suggests that hackers exploited a known vulnerability in the Citrix ADC gateway servers used by the census bureau. Tracked as CVE-2019-19781, exploiting this flaw would allow threat actors to evade authentication on Citrix ADC devices and execute malicious code on affected systems.
In this regard, the company published a security alert related to this flaw in 2019, also publishing some tips to mitigate the risk of exploitation while the security patches were ready. Although the patch was released in January 2020, multiple attempts at active exploitation had already been detected.
One of these exploitation incidents was detected at the Census Bureau, as researchers estimate that Citrix implementations at this agency were compromised during the first day of active exploitation of the flaw.
In its report, the OIG notes that while Census Bureau firewalls managed to contain the attack, the agency was unable to prevent the exploitation of CVE-2019-19781, in addition to some end-of-life Citrix implementations.
About this flaw, cybersecurity specialists point out that CVE-2019-19781 became one of the most exploited security flaws in recent years. According to the Cybersecurity and Infrastructure Security Agency (CISA), all kinds of hacking groups have exploited this vulnerability, from ransomware operations, cyber espionage units and thieves of sensitive information.
To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.