Brute-forcing passwords for VPN access has become a standard technique for various actors to access corporate networks to exfiltrate data later or deploy ransomware. After identifying the VPN, an attacker may use simple brute forcing, credential stuffing, or social engineering in some very public cases to obtain access.
Today, I noticed in one of my honeypots new “most commonly hit” URLs:
Read more
Tags: social engineering, brute, New, access, standard, data, Internet, Search, corporate, ransomware, honeypots, engineering, passwords, network, networks
Related Posts
- WatchGuard Threat Lab Report Reveals New Browser-Based Social Engineering Trendsa
- The Top 3 Countries With The Best Cyber Warfare Capabilitiesa
- Akira ransomware gang spotted targeting Cisco VPN products to hack organizationsa
- ZTNA can be more than a VPN replacement for application accessa
- Why Are You Texting Me? UNC3944 Leverages SMS Phishing Campaigns for SIM Swapping, Ransomware, Extortion, and Notorietya