When analytics becomes intelligence

When analytics becomes intelligence

2026, Apr 13    

The hidden layer

Starting with version 2411, Citrix Web Studio integrates Pendo for usage tracking to understand how administrators interact with the management console, with the feature enabled by default.

Pendo captures data on feature clicks, page loads, and user interactions to provide insights into user behavior and improve the product experience. As per default this information is stored on the US geo-located GCP (Google Cloud Platform).

In many, cloud-based and even on-premises, Citrix environments, the Pendo.io analytics tooling is quietly embedded (a.k.a. as ‘opt-out feature’) into the interface. Its purpose is harmless on paper:

  • track feature usage
  • improve UX
  • guide users

Even when your Citrix environment is in a secluded (no proxy or internet connected) your workstation, on which you do the administrative tasks, is most probably connected to the interwebs. The API calls, while using the Citrix administrative tools mentioned, are instigated from your workstation towards Pendo.io, over your internet connection.

In practice, it introduces a second layer of visibility—one that observes not just systems, but people using them.


The token you didn’t notice

Pendo uses a structured token (often referred to as a JZB token) to correlate activity, see the pendo-io JZB tool on GitHub.

It typically contains Base64-encoded JSON such as:

  • visitor_id - Can contain your Active Directory domain name and account name, possibly UPN formatted.
  • account_id - In case of on-premises Citrix, it can contain your domain in the URL
  • browser_time - Time stamp (epoch) of your activities
  • loginMethod - Which logon method you used
  • adminType - What level of administrative right you have
  • version - Which version of Citrix is installed
  • numberofDDCs - This can indicate the size of the Citrix environment

This token is:

  • readable in the browser
  • accessible to scripts
  • transmitted with analytics events

It doesn’t grant direct access, however it answers important questions:

In case of UPN naming: what is your real name for OSINT?

Who is doing what action?

What is your level of administrative rights?

Which hours and days are you working?

Which company are you working for?

What kind of environment is installed?


Behavior is the real data

Now combine that identity context with what Pendo actually tracks:

  • user profiling
  • customer profiling
  • environment profiling
  • clicks
  • navigation paths
  • feature usage
  • workflow/hours timing

You no longer have telemetry.

You have:

a behavioral blueprint of your (administrative users in your) organization


If When this data leaks

Even without a breach of core systems, exposure of analytics data enables:

  • mapping of internal tools
  • identification of high-privilege users
  • reconstruction of workflows
  • timing of user activity

An attacker doesn’t need credentials to learn:

how your system is used in the real world


Instead of relying on generic phishing campaigns, access to detailed platform insights enables highly targeted and convincing attacks—often referred to as spear phishing or even context-aware social engineering.

With this level of information, attackers can significantly increase their success rate by aligning their approach with the victim’s real environment and behavior:

  • Highly specific target audience
  • Messages can be tailored specifically to administrative or privileged users of a platform, who typically have broader access and higher impact if compromised.
  • Contextual credibility through workflow references
  • By referencing actual processes, tools, or internal terminology, attackers can craft messages that feel legitimate and familiar, lowering suspicion.
  • Convincing replicas of real interfaces
  • Fake login pages or task flows can closely mimic the actual platform, making it difficult—even for experienced users—to distinguish between real and malicious interactions.
  • Behavior-based timing
  • Delivering phishing messages at moments when users are most active (e.g., start of workday, routine task windows) increases the likelihood of engagement and reduces critical scrutiny.

Why this is more dangerous?

Unlike traditional phishing, this approach reduces the typical red flags users rely on. The attack blends into normal operations, exploiting trust, routine, and familiarity rather than just curiosity or urgency.

Practical implication

This means that user awareness alone is no longer sufficient. There is a need for layered defenses, such as:

  • Strong authentication (e.g., MFA)
  • Behavioral anomaly detection
  • Strict access controls
  • Continuous monitoring of unusual workflows or login patterns

When the damage is already done, how to remove the data from Pendo.io?

  1. Plug the leak

Disable the Pendo snippet or tracking, see section ‘How to disable…’ below.

Automate where applicable.

  1. Request for deletion existing data

Contact Citrix/Pendo support for: Visitor/account deletion Bulk data removal

  1. Require proof of deletion

Bottom line: Stop collection first, then request backend deletion—prevention is key going forward.


How to disable or limit Pendo

1. Block at network level

Block DNS requests for:

  • *.pendo.io

2. Browser blocking

  • Use content blockers or policies

3. Citrix settings

4. Verify

  • Check DevTools (F12) → check for pendo.io calls

Final thoughts

If data can be used to imitate behavior, it becomes intelligence.

Stay away from the Citrix Customer Experience Improvement Program a.k.a. CEIP, as far as possible.

Richard Stallman is right!