The researchers discovered the intrusion while investigating a Citrix Bleed Two vulnerability which was also being exploited ...