
VPN’s New Lease on Life
As the world adjusts to the new normal brought about with COVID-19, companies everywhere have been scrambling to protect their remote employees. With most organizations globally running remote operations and cybercriminals preying on the Coronavirus pandemic, there has never been a more crucial time for IT security departments everywhere.
Perhaps unsurprisingly, virtual private network software (VPN) usage has seen a spike in usage as the need for remote working rises. Despite often being considered a ‘dinosaur’ technology, the Coronavirus pandemic has seemingly given it a new lease of life.
However, as cybercrime techniques become more sophisticated and hackers increasingly motivated, the antiquated technologies of the past are no longer enough to defend against the new breed of malware and ransomware we are seeing today.  To adequately protect today’s remote workers organizations must look at the problem in a new way.
VPN’s are the new Attack Vector
Existing techniques are simply not enough to protect devices from the sophisticated threat landscape. Traditionally, companies have relied on VPN’s to connect to corporate networks, or third-party VPN’s to provide some level of anonymity. Unfortunately, there are several problems associated with this technique.
Firstly, it assumes that users actually turn on the VPN on their device, which is often not the case. Recent reports suggest that only 46% of users actually turn it on when using the device.
Secondly, VPN’s don’t actually prevent an attack on a device, and they are still prone to the same vulnerabilities as a normal device. They can still download malware, become infected by ransomware and are therefore still subject to data breaches. From a security perspective, VPN’s have become a new attack vector for cybercriminals. In fact, the recent Meow attacks specifically target VPN session secrets and tokens, as well as IP addresses of both user devices and the VPN servers they connected to.
It has also been reported that the passwords of 900+ VPN servers has been compromised and leaked online. The frequency of these attacks has only been increasing with COVID-19. This validates many of the trends we have been seeing at BlackFog and why we focus so much around on device privacy and security.
Reports have suggested that hackers have been targeting VPN’s from major vendors to infiltrate and plant backdoors into corporations all over the world. From a privacy perspective, VPN data breaches are not uncommon, as evidenced by hacks at NordVPN and TorGuard. These attacks allow hackers to access user activity and extract data. It is therefore not surprising that they have become new targets, providing a central repository of network traffic by individuals.
VPN’s are specifically designed to provide secure access to a corporate network, allowing access to internal documents and other corporate services. However, in recent years, VPN’s have been used to bypass regional controls on content for services such as Netflix, music services and government censorship. More recent concerns about privacy have increased their popularity with promises of online anonymity. However, users should be mindful that there is no such guarantee and that they are subject to government regulation and recording. Several reports have demonstrated that many VPN’s and ad blockers are secretly collecting user data. In addition, within some regions of the world such as China, United Arab Emirates, and Turkey, VPN’s are illegal.
Prevention is the best form of Defense
So, if VPN’s aren’t the answer to securing remote workers, what should organizations be doing? We need to assume that at some point hackers will find their way into the network. The focus should be on preventing the data leaving the network, which can only be done by monitoring outbound data flow and preventing data exfiltration.  Because modern attacks are predicated on the ability to communicate with third party servers to steal data, it’s crucial that any cybersecurity solution is able to monitor, detect and prevent the unauthorized transmission of such data in real time.
By focusing on preventing data loss, data profiling and data collection, BlackFog Privacy stops cyberattacks in real time. BlackFog protects from today’s modern threats by filling the gap between security solutions that focus on preventing access through intrusion detection systems, such as Firewalls and AV / Malware solutions that remove known infections after they have been discovered.
BlackFog is the only solution that provides on-device protection from data exfiltration, no data is ever sent to the cloud. BlackFog is also the only solution able to block outbound dataflow, ensuring what is on your device stays on your device. BlackFog’s 12 layers of defense protect from ransomware, spyware, malware, phishing, unauthorized data collection and profiling.
BlackFog is helping companies around the world to protect their remote teams during the Coronavirus pandemic with free 30-day coverage for all of your devices. Get in touch with us at in**@******og.com to learn more.
Share This Story, Choose Your Platform!
Related Posts
The State of Ransomware: February 2026
BlackFog's state of ransomware February 2026 measures publicly disclosed and non-disclosed attacks globally.
Steaelite RAT Enables Double Extortion Attacks from a Single Panel
Steaelite is a newly emerging RAT that unifies credential theft, data exfiltration, and ransomware in a single web panel, accelerating double extortion attacks.
ClawdBot and OpenClaw: When Local AI Becomes A Data Exfiltration Goldmine
ClawdBot stores API keys, chat histories, and user memories in plaintext files, and infostealers like RedLine, Lumma, and Vidar are already targeting it.
West Harlem Group Assistance Stops Ransomware and Cryptojacking with BlackFog ADX
West Harlem Group Assistance secures its community mission by preventing ransomware and cryptojacking with BlackFog ADX.
Why Traditional Security Fails To Deal With Advanced Persistent Threats
Learn why advanced persistent threats remain a growing cybersecurity risk in 2026 and where organizations must focus to address them.
What Does Advanced Threat Protection Really Mean In 2026?
Find out why businesses need advanced threat protection to cope with the new era of sophisticated, persistent cyber risks.






