TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

Four Risks to Consider with Expanded VPN Deployments

2020-04-10 · Read original ↗

ATT&CK techniques detected

4 predictions
T1133External Remote Services
98%
"vpns are corporate - managed, fully patched systems, with certificates for authentication, strong passwords, and endpoint protection software installed. these can be managed remotely just as when they are on the lan, and many vpns offer facilities for detecting if the machines co…"
T1078Valid Accounts
45%
"and authenticate to a vpn endpoint is the same as someone walking into your headquarters and plugging in their computer. you can authenticate vpn users in a variety of ways, ranging from authenticating the username and password against microsoft ’ s active directory or utilizing …"
T1133External Remote Services
45%
"and authenticate to a vpn endpoint is the same as someone walking into your headquarters and plugging in their computer. you can authenticate vpn users in a variety of ways, ranging from authenticating the username and password against microsoft ’ s active directory or utilizing …"
T1133External Remote Services
41%
". ideally, deploy vpns in high - availability configurations for the same reason. vpns can handle traffic in different ways. most provide both a split - tunnel option and a full - tunnel option. in split - tunnel configurations, only traffic destined for the corporate network is …"

Summary

The rush to deploy remote access solutions can bring unexpected risks to light.