Particle.news

Download on the App Store

Hackers Test HexStrike‑AI Against Newly Disclosed Citrix Flaws

Security telemetry shows early attacker interest on darknet forums, with roughly 8,000 NetScaler devices still exposed.

Overview

  • Check Point reports threat actors discussing and attempting to use the HexStrike‑AI framework to target Citrix NetScaler vulnerabilities CVE-2025-7775, CVE-2025-7776, and CVE-2025-8424 within days of disclosure.
  • Darknet posts claim successful exploitation and offer access to compromised NetScaler appliances for sale, though direct attribution to HexStrike‑AI remains unconfirmed.
  • ShadowServer data shows about 8,000 endpoints still vulnerable to CVE-2025-7775 as of September 2, down from roughly 28,000 the prior week.
  • HexStrike‑AI is an open‑source red‑teaming framework by Muhammad Osama that orchestrates more than 150 tools with LLM‑driven agents, human‑in‑the‑loop control, and automated retry and recovery logic.
  • Check Point warns such AI‑driven automation can compress disclosure‑to‑exploitation timelines and urges rapid patching plus AI‑aware defenses, as researchers also highlight prompt‑injection risks for security agents.