Virtual Private Network (VPN)

Description

This detector identifies the use of an encrypted network tunnel to route user traffic through a virtual private network (VPN). Rather than treating all VPN usage uniformly, the detector classifies VPN connections based on provider type, infrastructure characteristics, and reputation signals.

VPN usage is categorized into several broad classes, each carrying different risk implications:

  • Attack-favored VPN services

    High-anonymity commercial VPN providers that are disproportionately used by threat actors due to minimal logging policies, resilience to takedown, or accessibility from restricted regions.

  • Consumer and private VPN services

    Widely used commercial VPNs employed by the general public for privacy, remote access, or bypassing content restrictions.

  • Enterprise-managed VPN infrastructure

    Corporate VPN solutions operated and managed by organizations, such as secure access gateways or device-based tunnels. These connections are generally tied to a specific enterprise environment and are typically associated with lower risk when they align with known organizational usage.


Relevance to Social Engineering Attacks

VPNs play a central role in enabling attackers to establish technical plausibility that supports social engineering narratives. By controlling where traffic appears to originate, attackers can reinforce false claims of identity or location.

Common attacker use cases include:

  • Geographic alignment with victim profiles

    Attackers impersonating employees frequently select VPN exit nodes located in the same city or region as the victim. When technical logs reflect the expected location, help desk agents and automated systems are less likely to suspect impersonation.

  • Bypassing perimeter-based access controls

    Many organizations restrict access to administrative interfaces or sensitive systems to traffic originating from internal networks or approved VPN ranges. After stealing credentials, attackers use VPN access to circumvent these controls and appear as legitimate internal users.

  • Provider reputation as a risk signal

    Certain VPN providers are strongly associated with malicious activity. Detection of traffic originating from such providers can serve as a high-confidence indicator of elevated risk, particularly when correlated with other behavioral or device-level anomalies.


Examples of Detected VPN Providers

This detector is effective against a broad spectrum of VPN services, including:

  • High-risk or attack-favored VPN providers

    Astrill VPN, Mullvad, Perfect Privacy.

  • Consumer and private VPN services

    NordVPN, ExpressVPN, Surfshark.

  • Enterprise VPN solutions

    Zscaler, Palo Alto GlobalProtect, Cisco AnyConnect.


Notable Incidents and Threat Actors

  • North Korean IT Worker operations and the Lazarus Group

    Intelligence from recent years indicates extensive use of Astrill VPN by North Korean operators, including so-called “fake IT workers” and Lazarus Group subgroups, to conceal true locations while applying for remote roles or accessing compromised infrastructure.

  • Scattered Spider (UNC3944)

    Frequently observed using commercial VPN services to align IP geolocation with the physical location of the victims they impersonate during SIM swap attacks and help desk–driven social engineering.

  • Akira Ransomware

    Known for leveraging compromised credentials to gain initial access through corporate VPNs, often following successful social engineering campaigns.