Skip to content

WHITEPAPER

Who Watches the Firewall?

Edge device security, exploit blindness, and the case for deception

 

Download the whitepaper

The perimeter has no perimeter.

VPN gateways, firewalls, and remote access systems sit at the boundary of your network. These edge device measures are trusted, permanently exposed, and now actively hunted, with AI compressing the time from patch release to working exploit from weeks to hours.

Attackers exploited Citrix Bleed within 48 hours of the advisory. Log evidence was gone in 25. This whitepaper shows exactly what happened, step by step, and what detection at the edge actually looks like.

Download the whitepaper

Read the research

Get named attacker playbooks, real log sequences, and a deception-based detection framework you can act on.

Inside the edge device exploit playbook

How mass exploitation of Citrix NetScaler began within two days of the adversary, with roughly 5,000 - 6,000 devices exposed and log evidence gone after 24 hours.

The five-step attacker playbook in full: exploit, persist, erase, harvest credentials, move laterally - and what each stage looks like in practice.

Why detection fails at the edge: the specific logging limitations, evidence loss windows, and blind spots that make post investigation unreliable.

How a deception deployment goes from configuration to active intelligence collection in under 60 seconds.

What two real Deception Satellite deployments capture and what conventional tooling missed.

Strategic and implementation recommendations for detection at the perimeter.

Why we wrote this

CounterCraft deploys deception technology directly at the network perimeter, placing realistic decoys alongside real edge devices so that any attacker who gains access immediately interacts with an environment designed to expose them. Unlike detection tools that depend on logs that attackers erase or signatures that memory-only exploits evade, deception generates high-confidence alerts from attacker behavior itself. A Deception Satellite can go from configuration to active intelligence collection in under 60 seconds.  

Detection triggers on

Attacker behavior

Time to collection

Under 60 seconds

Evidence source

Live deployments

Why Edge Device Exploits go Undetected

Nearly half of all known exploited vulnerabilities target enterprise edge devices. The window to act is shorter than most teams assume: AI-assisted tooling has collapsed the time from public advisory to working exploit, and patches that once bought days or weeks now only buy hours.

The Citrix NetScaler campaign documented in this whitepaper illustrates the problem precisely. Mass exploitation of CVE-2023-4966 (Citrix Bleed) began two days after the advisory. Log evidence was gone within 25 hours. Not because responders were slow, but because the attacker’s first move was to erase evidence. The same pattern appears in the Ivanti campaign: code executing entirely in memory, nothing left on disk, and a clean result from the vendor’s own integrity checker. 

By the time activity reaches production systems, the evidence is already gone. 

Detection has to happen at the moment of initial access, while the attacker is still establishing their foothold and before logs are wiped.

That’s what the whitepaper explores: with deception technology at the perimeter, deployment that reaches collection in under 60 seconds, capturing attacker behavior in real time rather than reconstructing fragments later. 

Download the whitepaper to see our research on the full playbooks, the raw evidence, and what detection at the edge actually looks like. 

Download now

Download now

Download Who Watches the Firewall? Edge Security, Exploit Blindness, and the Case for Deception to get access to named incidents, attacker playbooks, real log sequences, and the case for deception as a detection layer at the edge.