Back to all incidents

ICBC Financial Services — LockBit ransomware

LockBit ransomware disabled ICBC's US broker-dealer arm via the Citrix Bleed vulnerability in November 2023, disrupting US Treasury market settlement and forcing manual trade processing.

Target
ICBC Financial Services — LockBit ransomware
Date public
8 November 2023
Sector
Financial Services
Attack type
Ransomware
Threat actor
LockBit
Severity
High
Region
United States — broker-dealer subsidiary of ICBC

In November 2023 hackers shut down the computer systems of the US arm of ICBC — the Industrial and Commercial Bank of China, the world's largest bank by assets. The US subsidiary was a broker-dealer: a firm that processes trades in US government debt (Treasury bonds) on behalf of other financial institutions. When the systems went down, the firm couldn't process trades electronically. To keep markets functioning, staff physically carried USB sticks containing trade details between offices so that counterparties could manually process the transactions. For two days, a systemically important piece of US financial market infrastructure was running on a process that would not have looked out of place in the 1980s. The attack entered through an unpatched Citrix login system — the same Citrix Bleed vulnerability used against Boeing two weeks earlier. The attackers didn't need to guess any passwords; they exploited a flaw in the software that let them steal login sessions from people who had already been verified. The incident prompted US Treasury and securities regulators to update their guidance on cyber resilience for broker-dealers.

What happened

On 8 November 2023, ICBC Financial Services — the US-registered broker-dealer subsidiary of the Industrial and Commercial Bank of China — experienced a LockBit ransomware attack that took its core systems offline. ICBC Financial Services was a significant participant in the US Treasury securities market, acting as a clearing broker for clients trading US government bonds through the Depository Trust & Clearing Corporation (DTCC). When its systems were encrypted, ICBC FS lost the ability to settle Treasury trades through normal electronic channels.

To prevent a cascade of unsettled trades from disrupting counterparties, ICBC FS staff adopted an emergency manual process: transaction data was written to USB sticks and physically transported to counterparties who could then process the settlements on their own systems. The Securities Industry and Financial Markets Association (SIFMA) monitored the situation and noted temporary concerns about liquidity in Treasury markets on 9 November. Market participants reported that settlement disruptions rippled through their own back-office systems as unsettled ICBC FS trades created failed-settlement chains that had to be manually unwound.

The US Treasury and the Federal Reserve were notified and monitored the situation closely. Treasury market disruption at scale is a systemic financial-stability concern: the US Treasury market is the largest and most liquid government-bond market in the world, and broker-dealer failures to settle represent operational credit risk that can compound quickly. The disruption resolved within two days as ICBC FS rebuilt clean systems sufficient to resume electronic settlement.

LockBit claimed responsibility. The attack used the Citrix Bleed vulnerability (CVE-2023-4966), the same entry vector used against Boeing two weeks earlier, confirming that LockBit affiliates were systematically scanning for and exploiting unpatched Citrix NetScaler appliances across the internet.

How it worked

As with the Boeing incident, the entry point was CVE-2023-4966, a critical vulnerability in Citrix NetScaler ADC and NetScaler Gateway appliances. Citrix had patched the vulnerability on 10 October 2023. ICBC Financial Services had not applied the patch before the attack on 8 November — a gap of nearly four weeks during which the vulnerability was publicly known and being actively exploited.

Citrix Bleed allowed an unauthenticated attacker to extract valid session tokens from a vulnerable appliance. These tokens represent authenticated sessions — meaning users who had already logged in, including completing any multi-factor authentication steps. An attacker presenting a stolen valid session token to the appliance was treated as an authenticated user. This gave the LockBit affiliate network-level access to ICBC FS’s internal environment without having to compromise any credentials or bypass MFA directly.

ICBC Financial Services was registered as a broker-dealer under US securities law and operated as a largely standalone entity from its Chinese parent in order to comply with US regulatory requirements. This separation meant its IT infrastructure, while bearing the ICBC name, was a distinct environment. The ransomware that encrypted ICBC FS systems did not propagate to the parent bank’s global systems. However, the isolation that protected ICBC’s broader infrastructure also meant that ICBC FS had limited access to parent-company IT resources during its emergency recovery.

The two-day USB-based settlement process attracted significant attention because it illustrated how rapidly operational resilience can collapse when a core system fails without an adequate manual fallback. DTCC and other market infrastructure operators subsequently reviewed their dependencies on individual broker-dealer system availability and updated counterparty resilience requirements.

Timeline

  • 10 October 2023 — Citrix discloses CVE-2023-4966 and releases patches.
  • 27 October 2023 — LockBit attacks Boeing using Citrix Bleed. Wave of Citrix Bleed exploitation against large organisations continues.
  • 8 November 2023 — LockBit ransomware deployed against ICBC Financial Services via unpatched Citrix NetScaler appliance. Systems encrypted. ICBC FS unable to process Treasury trades electronically.
  • 9 November 2023 — ICBC FS begins manual trade settlement via USB sticks. Reuters and FT report the attack. SIFMA raises concerns about Treasury-market liquidity.
  • 9–10 November 2023 — US Treasury and Federal Reserve monitor the situation. DTCC and market participants manage unsettled-trade chains.
  • 10 November 2023 — LockBit publishes Boeing data; separately acknowledges ICBC FS attack.
  • Within 2 days — ICBC FS restores sufficient electronic capability to resume normal settlement processing.
  • 21 November 2023 — CISA/FBI joint advisory AA23-325A published, covering the Citrix Bleed campaign across Boeing, ICBC FS, and other victims.
  • February 2024 — Operation Cronos disrupts LockBit.

What defenders should learn

ICBC Financial Services is the clearest modern example of what regulators call “concentration risk in financial market infrastructure.” A single broker-dealer, whose systems were down for two days, was sufficient to create measurable disruption in the world’s largest government-bond market. The lesson is not specific to cybersecurity: it is a financial-system architecture lesson. Critical market functions should not depend on the continuous electronic operation of a single participant without a resilience architecture — whether that means redundant systems, pre-agreed manual fallback procedures tested in drills, or distributed clearing arrangements that reduce single-point-of-failure exposure.

For the cybersecurity team, the patch-window lesson from Boeing applies with equal force here. ICBC FS had four weeks between the Citrix patch release and the attack. During those four weeks, Citrix Bleed was publicly described in security advisories and being actively exploited. A critical vulnerability in an internet-facing authentication appliance should trigger emergency patching within hours, not weeks. The infrastructure protecting network access is the highest-priority patching target in any organisation: a vulnerability there provides access to everything behind it.

The session-token theft mechanism warrants repetition because of how thoroughly it defeats the standard MFA narrative. Organisations that have completed MFA rollout often describe themselves as protected against credential-based attacks. Citrix Bleed bypassed MFA not by breaking it but by stealing the proof that authentication had already occurred. Defenders should understand the difference between controls that protect authentication and controls that protect post-authentication sessions, and ensure that short session timeouts, token validation, and anomaly detection on session activity are part of the security architecture for any internet-facing access gateway.

Sources

Back to all incidents