Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportBlogContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Attackers Love Your VPN To-Do List
    Huntress Cybersecurity
    Attackers Love Your VPN To-Do List
    Huntress Cybersecurity
    When PUPs Grow Fangs: Dragon Boss Solutions Left an Open Door on 25,000+ Endpoints
    Huntress Cybersecurity
    When PUPs Grow Fangs: Dragon Boss Solutions Left an Open Door on 25,000+ Endpoints
    Huntress Cybersecurity
    Your Security Program Was Built for a Threat Landscape That No Longer Exists
    Huntress Cybersecurity
    Your Security Program Was Built for a Threat Landscape That No Longer Exists
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Blog
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportBlogContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Attackers Love Your VPN To-Do List
Published:
April 16, 2026

Attackers Love Your VPN To-Do List

By:
Beth Robinson
Share icon
Glitch effectGlitch effectGlitch effect

One of the many security tasks you’ve been meaning to get to: the VPN configuration sitting quietly in the backlog. You’ve been waiting for a quieter week that never comes. But attackers are counting on it staying there.

Cybercrime is a real, thriving industry, and your "hidden competition." It targets your money and resources just as any legitimate competitor would. The global cybercrime economy is estimated to surpass $10 trillion in 2025, larger than the GDP of most nations. It runs on R&D, infrastructure, automation, affiliate programs, and even forced labor, a topic we explored in depth earlier this year. All of this at a pace that rivals the Fortune 500. And one of this illicit economy’s most reliable strategies is exploiting the security obligations you haven't yet gotten around to. 

Like securing your VPN.

If that sounds like a low-stakes oversight, the stories from our Security Operations Center (SOC) might give you a different perspective. All intrusions start somewhere, and all too often, it’s a simple VPN login that lacks additional security configurations.


The skeletons attackers love

Every organization has a security backlog. Tasks that linger in the background while operations move forward and the business scales. The average security team in those organizations is probably small and doing its best to prioritize. According to the Huntress How to Build a Resilient Security Team for 2030 field guide, the common sizes for IT and security teams range from six to 10 people (21.4%) and 11-15 people (19%). In some cases (18%), a single person on a team handles cybersecurity for the entire organization.  

Attackers actively hunt for these gaps, because an oversight—regardless of intention—left unresolved long enough is an open invitation. Your VPN is among the most common oversights we see exploited.


Your VPN is the unlocked front door

Attackers have options. They can force their way in, but these days, most prefer to simply log in as you. Exploits and zero days are still around, but they're noisy, which kills the stealth factor. Legitimate logins are quieter and far more effective, according to analysis in the Huntress 2026 Cyber Threat Report.

Dray Agha, Senior Manager of Tactical Response at Huntress, puts it plainly in the "Breaking the Kill Chain: How to Stop Ransomware Before the Encryption Starts" webinar:

"Roughly 70% of active intrusions we catch with our SOC begin with adversaries authenticating through VPN access."

The data backs this up. Anton Ovrutsky, Manager of Tactical Response at Huntress, says:

“We see too much VPN compromise, more than we'd like to see. And in many cases, we don’t have evidence to support that the threat actor landed on the appliance via some kind of zero day.”

Multi-factor authentication (MFA) is widely recognized as a critical defense barrier to slow down attackers, but its implementation can be messy in practice, especially for the 99%. The businesses we protect may not have access to an enterprise budget: medical offices, law firms, local construction companies, veterinarians, etc. Legacy systems complicate rollouts, service accounts break, workflows change, and projects stall. MFA becomes another item on the backlog. And everything is fine, until it isn't.


Real-world insights from our SOC

A close call with ransomware

In one recent incident, an attacker authenticated to a VPN without triggering any alarms, spent time mapping the environment, pivoted to key servers, and attempted to deploy Play ransomware.

What stopped it was timing. Managed Endpoint Detection and Response (EDR) and Managed Microsoft Defender fired off fast warning signals, and our SOC analysts jumped in before encryption had a chance.

Without this resilience plan, this business would've faced operational downtime, pricey recovery, reputational damage, and days of disruption. Instead, they got a hard lesson in cleaning up their VPN attack surface.


Figure 1: Shutting down a ransomware attempt stemming from unauthorized VPN authentication


When VPN logs disappear

Here's a pattern we see too often: missing logs.

In many instances, the first evidence of a VPN intrusion vanishes due to data storage issues before any investigation can begin. When we respond to incidents without centralized logging, we're often piecing together a story that starts halfway through.

This is where a Security Information and Event Management (SIEM) solution is essential. It preserves the full timeline of an intrusion, starting with the opening act, so defenders can understand not just what happened, but what needs to be fixed to prevent it from happening again.

Missing VPN logs aren't just missing information. They're blind spots that attackers will keep exploiting.

Red carpet access

In another case, a threat actor compromised SonicWall SSLVPN credentials and landed inside the target environment with administrative privileges that were handed to them on a silver platter by two compounding gaps: no MFA and no network or account segmentation.

Once inside, the attacker conducted network discovery via ping sweeps, then deployed Bring Your Own Vulnerable Driver (BYOVD) tactics to enumerate security tools, disable defenses, and establish persistence. Our SOC analysts caught and contained it, but the initial access was an easy win for the attacker.

Figure 2:  Huntress Managed SIEM dashboard showing VPN successful authentication events from the threat actor’s IP


One thing to check off your list this week

These incidents share a common thread: attackers didn't need to work hard. And fixing that doesn't mean you have to tackle everything at once.

If your VPN security has gaps, start here: enforce MFA. It's the single highest-impact step you can take, and it's the one that would've made both of the stories above significantly harder for the attacker.

After that, work the list in order of effort:

  • Audit privileged accounts. Remove admin rights that aren't actively needed. The SonicWall case handed an attacker admin access they had no business having.

  • Disable legacy and unused accounts. Old credentials are easy targets and readily available on dark web marketplaces.

  • Centralize your logs. You can't investigate what you can't see, and you can't fix what you can't trace back to the source.

  • Monitor for login anomalies, enforce allow/deny lists, and use strong, unique passwords. Lower lift, but worth locking in once the bigger items are done.

This isn't about a perfect backlog. It's about making your environment intentionally tougher to exploit than last week. 

We talk about VPN security a lot. You might wonder why we keep coming back to it.

Because resilient teams understand that some things will get missed. So they plan for that reality. They prioritize speed over volume, treat identity as a major attack surface, and build clear ownership to limit damage and recover quickly. For lean teams covering an entire organization, perfection usually isn’t realistic. What matters is having the visibility and response capability to catch what slips through before it turns into something worse.

Want to learn more about the cybercrime ecosystem? Check out our _declassified webinar series.



Categories
Cybersecurity Education
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab
AI sparkle iconSummarize This Page
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab

What's your social profile giving away?

Save your spot for the latest edition of _declassified and learn how attackers turn social media into intel.
Register now
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Healthcare Held Hostage: Fighting the Plague of Ransomware

    Ransomware is spreading like wildfire. Learn about its growing threat to healthcare, its impact on patient care, and how Huntress managed solutions can better protect your organization from cyberattacks.
  • Evolving the Hunt: Host Isolation for Smarter Defense

    Learn about Host Isolation, a new feature that's just been added to The Huntress Security Platform.
  • Post-Exploitation Activities Observed from the Samsung MagicINFO 9 Server Flaw

    Huntress has verified that attackers are exploiting flaws in Samsung MagicINFO 9 Server (version 21.1050.0). Understand why MagicINFO 9 Server shouldn’t be internet-facing until a patch is available and applied.
  • Threat Advisory: VMware Horizon Servers Actively Being Hit With Cobalt Strike

    Huntress is monitoring an incident in which VMware Horizon Servers are being hit with Cobalt Strike. Read our up-to-date blog to learn more.
  • What is Behavioral Analysis in Cybersecurity?

    Behavioral analysis is one of the most powerful ways to hunt down attackers. However, it’s a somewhat misunderstood element—it’s the human element that catches what AI and systems miss. Let’s uncover it and figure out where and how it fits in.
  • Calm In The Storm: Reviewing Volt Typhoon

    Explore the recent disclosures concerning Volt Typhoon, a threat actor engaged in the widespread exploitation of external-facing services and network appliances.
  • Four Sneaky Attacker Evasion Techniques You Should Know About

    Learn about four of the most prominent attacker evasion techniques that hackers use—and how you can defend your environments against them.
  • Untold Tales from Huntress Tactical Response

    Explore the inner workings of real-world cyberattacks and gain insight into the challenges faced by Huntress threat analysts. Discover the critical role of investigative techniques and their importance in uncovering and addressing these threats.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 242k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy