Active Threat Alert: Exploitation Attempts Targeting Fortinet and Citrix Devices from Russian IP Block
Organizations leveraging Fortinet FortiGate or Citrix Netscaler technologies should be aware of active exploitation attempts originating from the IP range 178.22.24.0/24, attributed to AS209290 (GALEON-AS), a network registered to Galeon LLC, based in Moscow, Russia. Security analysts have observed sustained malicious activity from this range, with evidence suggesting an automated campaign aimed at vulnerable perimeter systems. Indicators of Compromise (IOCs) Sample IP addresses involved in the attack activity: CopyEdit178.22.24.11 178.22.24.12 178.22.24.13 178.22.24.14 178.22.24.15 178.22.24.17 178.22.24.18 178.22.24.20 178.22.24.21 178.22.24.23 178.22.24.24 All of the above belong to the subnet 178.22.24.0/24, which should be treated as hostile and blocked where appropriate. Associated Vulnerabilities This threat activity aligns with known exploit patterns targeting the following critical vulnerabilities: Fortinet CVE-2023-27997 — FortiOS & FortiProxy SSL-VPN RCE ("XORtigate")[Unauthenticated RCE via heap-based buffer overflow][CVSS: 9.8] CVE-2022-40684 — FortiOS & FortiProxy Authentication Bypass[Enables attacker to modify system configurations via crafted requests][CVSS: 9.6] Citrix Netscaler CVE-2023-3519 — Citrix ADC…
