Skip navigation
How attackers are leveraging personal VPNs
Industry News

Not Just for Unlocking Content: How Attackers Are Leveraging Personal VPNs

As many a podcast host will tell you, it’s about time you used a consumer or personal Virtual Private Network (VPN). VPNs have become commonplace, serving various purposes from the noble, like protecting an individual’s digital footprint, to the dubious, like accessing geo-restricted content.

However, personal VPNs present a hidden threat when misused by attackers to obfuscate their location, posing significant security risks to organizations. Understanding and addressing personal VPN use is crucial for IT and Security teams to protect their networks effectively.

CISA Highlights the Risk of Personal VPN Use

VPNs are often touted as tools for privacy and security, but they can also be exploited by threat actors. The Cybersecurity and Infrastructure Security Administration (CISA) has highlighted their effective use in attacks. To subvert detection logic that relies heavily on IP address, threat actors are adopting personal VPNs to blend in with typical users. This tactic can make malicious connections harder to distinguish, enabling attackers to sneak through the cracks more easily.

The Role of IT and Security Teams

To safeguard your organization's security, it is vital to have a clear policy on personal VPN use. Depending on your organization's security requirements, you might consider banning them altogether or regulating their usage. Policies should be designed to prevent unauthorized access while allowing legitimate use cases under strict guidelines.

Detecting Personal VPN Use

Effective detection and response to personal VPN usage begins with understanding personal VPN use within your workforce. One way to gain this visibility is to use Cisco Identity Intelligence. This tool aggregates identity and access data across multiple sources and then provides a powerful analytical layer on top. One of its popular checks is designed to identify users logging in from personal VPNs, potentially evading IP-based controls and detections.

With compatibility across platforms like Microsoft Entra ID, Okta, Google Workspace, Salesforce, and Duo, Identity Intelligence provides a comprehensive view of VPN-related activities, helping teams verify usage against corporate policies and clarify access policies with users.

Strengthen Your Security Posture

Incorporating a robust detection mechanism for personal VPNs is a proactive step towards enhancing your organization's security posture. Evaluate Duo and Cisco Identity Intelligence to gain deeper insights and control over VPN activities within your network. By taking these steps, you can ensure that your defenses remain effective against evolving threats. If you’d like to learn more or see a demonstration, contact your Duo representative or reach out to a Duo expert.