Amazon's threat intelligence team has disclosed its discovery of a highly sophisticated advanced persistent threat (APT) group exploiting two previously unknown zero-day vulnerabilities in enterprise networking products from Cisco and Citrix. The campaign, first detected in May 2025, leveraged a deserialization flaw in Cisco Identity Service Engine (ISE) (CVE-2025-20337) and a flaw in Citrix NetScaler (CVE-2025-5777) to gain initial access and execute code. The threat actor deployed a custom, fileless web shell that operated entirely in memory to maintain persistence and evade detection. The ability to discover and weaponize multiple zero-days against critical network infrastructure indicates a well-funded and skilled nation-state-level adversary.
The APT group's campaign was first identified by Amazon's MadPot honeypot network, which detected probes against the Citrix vulnerability before its public disclosure. Subsequent investigation revealed the concurrent exploitation of the Cisco ISE flaw. The attackers chained these vulnerabilities to compromise critical identity and access management (IAM) systems, which are high-value targets for espionage and lateral movement.
The APT group demonstrated a high level of operational security and technical skill by using custom malware tailored specifically for the targeted environment.
The attack chain was sophisticated and stealthy:
T1190 - Exploit Public-Facing Application): The APT exploited either CVE-2025-20337 on a Cisco ISE device or CVE-2025-5777 on a Citrix appliance to gain initial code execution.T1059.006 - Python): Upon compromising the Cisco ISE, the actor deployed a custom web shell. The malware, named IdentityAuditAction, was written to blend in with legitimate system components.T1055 - Process Injection & T1620 - Reflective Code Loading): The web shell was fileless, operating entirely in-memory. It used Java reflection to inject itself into active server threads, making it invisible to traditional file-based antivirus scanners.T1071.001 - Web Protocols): The web shell acted as a backdoor, allowing the attacker to intercept legitimate HTTP requests to the ISE management interface and execute arbitrary commands.This use of in-memory malware and reflective loading is a hallmark of advanced threat actors aiming to minimize their forensic footprint.
Compromise of an IAM solution like Cisco ISE is a critical security event. It grants attackers control over network access policies, allowing them to create rogue accounts, bypass security controls like segmentation, and gain widespread access to the internal network. The attacker could monitor all authentication events, harvest credentials, and move laterally to other high-value systems. The business impact includes loss of sensitive data, complete network compromise, and significant disruption to operations. The targeting of edge network appliances represents a strategic effort to breach hardened perimeters.
The primary indicator was the custom web shell named IdentityAuditAction. No other specific IOCs like IP addresses or file hashes were publicly released.
Detecting such advanced attacks requires more than signature-based tools.
Dynamic Analysis.Network Traffic Analysis.M1051 - Update Software): Immediately apply the patches released by Cisco for CVE-2025-20337 and by Citrix for CVE-2025-5777.M1035 - Limit Access to Resource Over Network): The management interfaces of critical network appliances like Cisco ISE should never be exposed to the internet. Access should be strictly limited to a secure management network or bastion host.M1030 - Network Segmentation): Segment the network to prevent compromised edge devices from having direct access to critical internal resources. This contains the blast radius of a potential compromise.New technical details on Cisco ISE vulnerability, Citrix flaw nickname, and MITRE ATT&CK techniques provided.
Apply security patches from Cisco and Citrix to remediate the zero-day vulnerabilities.
Mapped D3FEND Techniques:
Isolate management interfaces of network appliances from the internet and general corporate networks.
Mapped D3FEND Techniques:
Segment networks to contain breaches originating from edge devices.
Mapped D3FEND Techniques:
The exploitation of Cisco ISE and Citrix appliances was successful because their management interfaces were accessible to the attacker. The most effective mitigation, beyond patching, is to implement strict network isolation for all critical infrastructure management portals. These interfaces should be placed on a separate, hardened management VLAN or network segment. Access to this segment should be controlled via a bastion host or jump box, with multi-factor authentication required for access. Firewall rules must be configured to deny all traffic to these management interfaces from the internet and from general user subnets. This architectural change dramatically reduces the attack surface, making it impossible for an external attacker to even attempt to exploit vulnerabilities like CVE-2025-20337 or CVE-2025-5777.
The APT's use of a fileless, in-memory web shell is designed to defeat static, file-based security tools. To counter this, security teams must employ dynamic analysis and memory forensics. For critical appliances like Cisco ISE, schedule regular memory captures and analyze them for signs of compromise. Look for injected code, hooked functions, and network sockets opened by unexpected processes. EDR solutions with memory scanning capabilities can automate this process, hunting for indicators of reflective loading (T1620). By analyzing the live state of the system rather than just files on disk, defenders can uncover stealthy malware like the 'IdentityAuditAction' web shell used in this attack. This is an advanced but necessary capability for detecting sophisticated threat actors.
Continuously monitor network traffic to and from critical infrastructure like Cisco ISE. Establish a strict baseline of normal communication patterns for these devices. The management interface should only communicate with a small, well-defined set of administrative workstations and other management tools. Any deviation, such as connections to or from external IP addresses, connections using non-standard ports, or unusually large data transfers, should trigger a high-priority alert. Deploying network detection and response (NDR) tools can help automate this baselining and anomaly detection, providing a crucial layer of visibility to spot C2 communications or data exfiltration from a compromised appliance.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats