Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportBlogContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Threat Advisory: Uptick in Bomgar RMM Exploitation
    Huntress Cybersecurity
    Threat Advisory: Uptick in Bomgar RMM Exploitation
    Huntress Cybersecurity
    Codex Red: Untangling a Linux Incident With an OpenAI Twist (Part 1)
    Huntress Cybersecurity
    Codex Red: Untangling a Linux Incident With an OpenAI Twist (Part 1)
    Huntress Cybersecurity
    Attackers Love Your VPN To-Do List
    Huntress Cybersecurity
    Attackers Love Your VPN To-Do List
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Blog
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportBlogContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Attackers Love Your VPN To-Do List
Last Updated:
April 17, 2026

Attackers Love Your VPN To-Do List

By:
Beth Robinson
Share icon
Glitch effectGlitch effectGlitch effect

This blog was updated on April 17 to include threat activity we’re observing with Nightmare-Eclipse's BlueHammer, RedSun, and UnDefend exploitation techniques.

One of the many security tasks you’ve been meaning to get to: the VPN configuration sitting quietly in the backlog. You’ve been waiting for a quieter week that never comes. But attackers are counting on it staying there.

Cybercrime is a real, thriving industry, and your "hidden competition." It targets your money and resources just as any legitimate competitor would. The global cybercrime economy is estimated to surpass $10 trillion in 2025, larger than the GDP of most nations. It runs on R&D, infrastructure, automation, affiliate programs, and even forced labor, a topic we explored in depth earlier this year. All of this at a pace that rivals the Fortune 500. And one of this illicit economy’s most reliable strategies is exploiting the security obligations you haven't yet gotten around to. 

Like securing your VPN.

If that sounds like a low-stakes oversight, the stories from our Security Operations Center (SOC) might give you a different perspective. All intrusions start somewhere, and all too often, it’s a simple VPN login that lacks additional security configurations.


The skeletons attackers love

Every organization has a security backlog. Tasks that linger in the background while operations move forward and the business scales. The average security team in those organizations is probably small and doing its best to prioritize. According to the Huntress How to Build a Resilient Security Team for 2030 field guide, the common sizes for IT and security teams range from six to 10 people (21.4%) and 11-15 people (19%). In some cases (18%), a single person on a team handles cybersecurity for the entire organization.  

Attackers actively hunt for these gaps, because an oversight—regardless of intention—left unresolved long enough is an open invitation. Your VPN is among the most common oversights we see exploited.


Your VPN is the unlocked front door

Attackers have options. They can force their way in, but these days, most prefer to simply log in as you. Exploits and zero days are still around, but they're noisy, which kills the stealth factor. Legitimate logins are quieter and far more effective, according to analysis in the Huntress 2026 Cyber Threat Report.

Dray Agha, Senior Manager of Tactical Response at Huntress, puts it plainly in the "Breaking the Kill Chain: How to Stop Ransomware Before the Encryption Starts" webinar:

"Roughly 70% of active intrusions we catch with our SOC begin with adversaries authenticating through VPN access."

The data backs this up. Anton Ovrutsky, Manager of Tactical Response at Huntress, says:

“We see too much VPN compromise, more than we'd like to see. And in many cases, we don’t have evidence to support that the threat actor landed on the appliance via some kind of zero day.”

Multi-factor authentication (MFA) is widely recognized as a critical defense barrier to slow down attackers, but its implementation can be messy in practice, especially for the 99%. The businesses we protect may not have access to an enterprise budget: medical offices, law firms, local construction companies, veterinarians, etc. Legacy systems complicate rollouts, service accounts break, workflows change, and projects stall. MFA becomes another item on the backlog. And everything is fine, until it isn't.


Real-world insights from our SOC

When off-the-shelf tools become weapons

The VPN is often where the intrusion story starts, but what happens next can get creative.

In a recent incident, our SOC analysts noticed something unusual. There were binaries staged in places they had no business being: a low-privilege user's Pictures folder, and a two-letter subfolder buried in their Downloads directory. The filenames were a tell: FunnyApp.exe, RedSun.exe, z.exe. Not exactly the naming convention legitimate software follows.

They were looking at BlueHammer, RedSun, and UnDefend, three publicly available exploitation tools on GitHub, attributed to Nightmare-Eclipse. 

Before tool execution, analysts observed a familiar sequence of hands-on-keyboard enumeration commands: whoami /priv, cmdkey /list, net group. This signaled that someone was inside the environment, figuring out what they had to work with. As for how they got in the door initially? A compromised FortiGate VPN.

Windows Defender detected and blocked BlueHammer first, which was followed by sketchy RedSun activity a few days later. But the attacker wasn't counting on Defender alone to fail. They were counting on getting enough time to escalate before anyone noticed. Alerts alone wouldn't have told the full story here. It took our SOC analysts connecting the dots to shut it down before it caused major damage.


A close call with ransomware

In one recent incident, an attacker authenticated to a VPN without triggering any alarms, spent time mapping the environment, pivoted to key servers, and attempted to deploy Play ransomware.

What stopped it was timing. Managed Endpoint Detection and Response (EDR) and Managed Microsoft Defender fired off fast warning signals, and our SOC analysts jumped in before encryption had a chance.

Without this resilience plan, this business would've faced operational downtime, pricey recovery, reputational damage, and days of disruption. Instead, they got a hard lesson in cleaning up their VPN attack surface.


Figure 1: Shutting down a ransomware attempt stemming from unauthorized VPN authentication


When VPN logs disappear

Here's a pattern we see too often: missing logs.

In many instances, the first evidence of a VPN intrusion vanishes due to data storage issues before any investigation can begin. When we respond to incidents without centralized logging, we're often piecing together a story that starts halfway through.

This is where a Security Information and Event Management (SIEM) solution is essential. It preserves the full timeline of an intrusion, starting with the opening act, so defenders can understand not just what happened, but what needs to be fixed to prevent it from happening again.

Missing VPN logs aren't just missing information. They're blind spots that attackers will keep exploiting.

Red carpet access

In another case, a threat actor compromised SonicWall SSLVPN credentials and landed inside the target environment with administrative privileges that were handed to them on a silver platter by two compounding gaps: no MFA and no network or account segmentation.

Once inside, the attacker conducted network discovery via ping sweeps, then deployed Bring Your Own Vulnerable Driver (BYOVD) tactics to enumerate security tools, disable defenses, and establish persistence. Our SOC analysts caught and contained it, but the initial access was an easy win for the attacker.

Figure 2:  Huntress Managed SIEM dashboard showing VPN successful authentication events from the threat actor’s IP


One thing to check off your list this week

These incidents share a common thread: attackers didn't need to work hard. And fixing that doesn't mean you have to tackle everything at once.

If your VPN security has gaps, start here: enforce MFA. It's the single highest-impact step you can take, and it's the one that would've made both of the stories above significantly harder for the attacker.

After that, work the list in order of effort:

  • Audit privileged accounts. Remove admin rights that aren't actively needed. The SonicWall case handed an attacker admin access they had no business having.

  • Disable legacy and unused accounts. Old credentials are easy targets and readily available on dark web marketplaces.

  • Centralize your logs. You can't investigate what you can't see, and you can't fix what you can't trace back to the source.

  • Monitor for login anomalies, enforce allow/deny lists, and use strong, unique passwords. Lower lift, but worth locking in once the bigger items are done.

This isn't about a perfect backlog. It's about making your environment intentionally tougher to exploit than last week. 

We talk about VPN security a lot. You might wonder why we keep coming back to it.

Because resilient teams understand that some things will get missed. So they plan for that reality. They prioritize speed over volume, treat identity as a major attack surface, and build clear ownership to limit damage and recover quickly. For lean teams covering an entire organization, perfection usually isn’t realistic. What matters is having the visibility and response capability to catch what slips through before it turns into something worse.

Want to learn more about the cybercrime ecosystem? Check out our _declassified webinar series.



Categories
Cybersecurity Education
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab
AI sparkle iconSummarize This Page
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab

What's your social profile giving away?

On May 20 (12pm EST), join Truman Kain and Caitlin Sarian ("Cybersecurity Girl") for the latest edition of _declassified and learn how attackers turn social media into intel.
Register now
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Pairing SOCs with Automation: You Won’t Be Replaced by a Robot Yet

    We can use automation, detection and response, and open-source software to solve common SOC challenges. Read about simple approaches for SOC automation.
  • The VPN Mistake That Almost Cost a Company Everything

    Get an insider look at how the Huntress SOC stopped an unsecured VPN based ransomware attack. Learn why your business needs more than just software to stay secure.
  • The Identity Breach You Didn’t Know You Had: Google Workspace

    Most Google Workspace breaches go undetected for weeks. See how attackers exploit misconfigured permissions and what to look for before it is too late.
  • Shifting Left: Huntress Expands Into Proactive Security Posture Management

    Huntress "shifts left" with Managed ESPM and Managed ISPM. We proactively harden your endpoints and identities to close the security gaps that attackers love to exploit.
  • Teach Yourself to Phish: The Strategy Behind Phishing Simulations

    Get ready for a phishing trip! Learn about the strategy behind phishing simulations and how it can help your organization build resilience against real phishing threats.
  • How Huntress Achieved a Blazing Fast MTTR (and Why It Matters)

    The Huntress SOC has an average response time of 8 minutes. That means we can investigate threats, send incident reports, and resolve alerts in record time, shutting down attackers before they have a chance to act.
  • Phishing in the Fast Lane: The Attacker’s Eye View

    Join Huntress team members as they walk through some of the most malicious phishing techniques, presented from the attacker's perspective.
  • How to Deal with Alert Fatigue Like a Security Pro

    Deal with alert fatigue like a pro. Learn practical tips from Huntress' SOC on managing overwhelming alerts, preventing burnout, and focusing on real threats.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 242k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy