AI framework Hexstrike-AI repurposed by cybercriminals for rapid attacks

With Hexstrike-AI, threat actors now automate multi-stage reconnaissance and exploitation workflows against critical vulnerabilities without human intervention.

Hexstrike-AI, zero-day exploit automation, Citrix NetScaler CVE-2025-7775, AI orchestration, multi-agent security toolchain, MCP protocol, agentic AI for hacking

Within hours of its public release, the offensive security framework Hexstrike-AI has been weaponised by threat actors to exploit zero-day vulnerabilities, most recently affecting Citrix NetScaler ADC and Gateway, within just ten minutes.

Automated agents execute actions such as scanning, exploiting CVEs and deploying webshells, all orchestrated through high-level commands like ‘exploit NetScaler’.

Researchers from CheckPoint note that attackers are now using Hexstrike-AI to achieve unauthenticated remote code execution automatically.

The AI framework’s design, complete with retry logic and resilience, makes chaining reconnaissance, exploitation and persistence seamless and more effective.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!