Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Amazon Exposes Early Zero-Day Attacks Targeting Cisco and Citrix
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Amazon Exposes Early Zero-Day Attacks Targeting Cisco and Citrix

Highlights

  • Amazon detected early exploitation of Cisco and Citrix zero-days by a skilled group.

  • Attackers exploited the flaws before public disclosure and vendor patches.

  • Collaboration and quick patching are essential to limit zero-day exposure risks.

Samantha Reed
Last updated: 12 November, 2025 - 9:49 pm 9:49 pm
Samantha Reed 3 hours ago
Share
SHARE

A sophisticated campaign targeting enterprise network infrastructure surfaced in the recent findings of Amazon’s threat intelligence team, revealing active exploitation of previously undisclosed vulnerabilities in Cisco Identity Services Engine (ISE) and Citrix NetScaler. The attacks were detected before either company publicly confirmed or patched the issues, highlighting the persistent and evolving threat posed by advanced hacking groups. As businesses depend on these products for critical identity and network management, the early exploitation raises concerns about existing security postures and the speed at which threat actors move. Amazon’s own monitoring infrastructure, MadPot, played a key role in catching initial activity linked to this campaign, raising questions about industry-wide detection capabilities.

Contents
How Did Amazon Detect the Early Attacks?What Methods Did Attackers Use Against Cisco and Citrix?How Did Cisco and Citrix Respond to the Findings?

Earlier disclosures regarding similar vulnerabilities did not involve pre-release exploitation on this scale, nor did they highlight such coordinated activity across vendors. Conventionally, vendors have announced critical vulnerabilities shortly after attackers begin targeting them, but this incident demonstrates a considerable gap between threat actor operations and vendor response. The rapid timeline and cross-platform nature of these exploits mark a notable shift in adversary behavior, amplifying the need for enhanced real-time detection and collaboration among major technology providers.

How Did Amazon Detect the Early Attacks?

Detection efforts relied on Amazon’s MadPot honeypot service, which logs and analyzes suspicious internet activity. Unusual scanning and exploitation behaviors targeting CVE-2025-5777 in Citrix and CVE-2025-20337 in Cisco were detected, prompting deeper investigation by Amazon security teams. Through this, analysts identified a well-resourced group leveraging zero-day bugs before any public advisory or fix was available. CJ Moses, the company’s chief information security officer, explained:

“We assess with high confidence it was the same threat actor observed exploiting both vulnerabilities.”

What Methods Did Attackers Use Against Cisco and Citrix?

The threat group demonstrated significant technical capability, using custom-developed malware specifically built for Cisco ISE environments and equipped with mechanisms to evade detection. This backdoor exploited flaws in Cisco’s enterprise Java and Tomcat implementation. Moses noted the attacker’s proficiency, stating:

“The threat actor’s custom tooling demonstrated a deep understanding of enterprise Java applications, Tomcat internals and the specific architectural nuances of the Cisco ISE.”

The attackers initiated these efforts weeks before the official disclosure from vendors, further demonstrating advanced planning and reconnaissance.

How Did Cisco and Citrix Respond to the Findings?

After Amazon’s disclosure, Cisco informed affected customers within hours about the CVE-2025-20337 exploit, following its official advisory released on June 25. Citrix responded similarly regarding CVE-2025-5777, known as CitrixBleed 2, after noticing similarities with earlier vulnerabilities in the same product line. These efforts coincided with a public surge in attack attempts, which reached millions within a few weeks of exposure. The Cybersecurity and Infrastructure Security Agency took additional steps by cataloging the Citrix vulnerability among actively exploited threats on July 10, further affirming its significance within the cybersecurity landscape.

Amazon’s decision to wait before broadly sharing details about ongoing zero-day exploitation remains unexplained. The company did not provide information about more recent attacks or the precise impact on end clients. While no details surfaced regarding the group’s identity, the use of advanced exploitation methods and custom tooling indicates access to privileged research capability or confidential vulnerability information. The company characterized the objective as likely long-term espionage rather than immediate disruption, a stance echoed by industry experts analyzing threat group behaviors.

Infosec developments surrounding Cisco and Citrix have garnered significant attention over the years, often focused on patch effectiveness and public disclosure practices. The current attacks illustrate that adversaries adapt rapidly and actively seek identity and edge network weaknesses, especially as businesses diversify platform use. Large-scale incidents such as this highlight the importance of coordinated information-sharing between vendors, security companies, and government agencies to limit exposure windows and contain adversary activity quickly. Enterprises operating critical infrastructure should reassess patch management programs, accelerate adoption of detection technologies like honeypots, and stay updated on vendor advisories. Timely identification of new attack techniques and collaborative defense measures will play a crucial role in reducing risks tied to zero-day threats in the future.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Google Targets Lighthouse Text Scammers with Civil Lawsuit

FBI Targets Youth Cybercrime as Maryland Man Faces Federal Charges

Microsoft Fixes 63 Security Flaws, One Zero-Day Under Active Attack

Amazon Engages Outside Experts to Test NOVA AI Model Security

Clop Ransomware Hits GlobalLogic Using Oracle Vulnerability

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Tesla Introduces Live Supercharger Status to Google Maps
Next Article Google Targets Lighthouse Text Scammers with Civil Lawsuit

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Amazon Cuts Apple Watch Series 10 Price by $120
Wearables
World Labs Delivers Marble to Build 3D Worlds from Everyday Prompts
AI Technology
Tesla Signals Colombia Launch with Social Media Teaser
Electric Vehicle
Tesla Introduces Live Supercharger Status to Google Maps
Electric Vehicle
Terranova Deploys Robotics to Raise Flood-Prone Land
Robotics
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?