WHITEPAPER
Download the whitepaper
VPN gateways, firewalls, and remote access systems sit at the boundary of your network. These edge device measures are trusted, permanently exposed, and now actively hunted, with AI compressing the time from patch release to working exploit from weeks to hours.
Attackers exploited Citrix Bleed within 48 hours of the advisory. Log evidence was gone in 25. This whitepaper shows exactly what happened, step by step, and what detection at the edge actually looks like.
Download the whitepaper
Get named attacker playbooks, real log sequences, and a deception-based detection framework you can act on.
How mass exploitation of Citrix NetScaler began within two days of the adversary, with roughly 5,000 - 6,000 devices exposed and log evidence gone after 24 hours.
The five-step attacker playbook in full: exploit, persist, erase, harvest credentials, move laterally - and what each stage looks like in practice.
Why detection fails at the edge: the specific logging limitations, evidence loss windows, and blind spots that make post investigation unreliable.
How a deception deployment goes from configuration to active intelligence collection in under 60 seconds.
What two real Deception Satellite deployments capture and what conventional tooling missed.
Strategic and implementation recommendations for detection at the perimeter.
CounterCraft deploys deception technology directly at the network perimeter, placing realistic decoys alongside real edge devices so that any attacker who gains access immediately interacts with an environment designed to expose them. Unlike detection tools that depend on logs that attackers erase or signatures that memory-only exploits evade, deception generates high-confidence alerts from attacker behavior itself. A Deception Satellite can go from configuration to active intelligence collection in under 60 seconds.
Attacker behavior
Under 60 seconds
Live deployments
Nearly half of all known exploited vulnerabilities target enterprise edge devices. The window to act is shorter than most teams assume: AI-assisted tooling has collapsed the time from public advisory to working exploit, and patches that once bought days or weeks now only buy hours.
The Citrix NetScaler campaign documented in this whitepaper illustrates the problem precisely. Mass exploitation of CVE-2023-4966 (Citrix Bleed) began two days after the advisory. Log evidence was gone within 25 hours. Not because responders were slow, but because the attacker’s first move was to erase evidence. The same pattern appears in the Ivanti campaign: code executing entirely in memory, nothing left on disk, and a clean result from the vendor’s own integrity checker.
By the time activity reaches production systems, the evidence is already gone.
Detection has to happen at the moment of initial access, while the attacker is still establishing their foothold and before logs are wiped.
That’s what the whitepaper explores: with deception technology at the perimeter, deployment that reaches collection in under 60 seconds, capturing attacker behavior in real time rather than reconstructing fragments later.
Download the whitepaper to see our research on the full playbooks, the raw evidence, and what detection at the edge actually looks like.
Download now
Download Who Watches the Firewall? Edge Security, Exploit Blindness, and the Case for Deception to get access to named incidents, attacker playbooks, real log sequences, and the case for deception as a detection layer at the edge.