Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

3/19/2020
10:55 AM
100%
0%

VPN Usage Surges as More Nations Shut Down Offices

As social distancing becomes the norm, interest in virtual private networks has rocketed, with some providers already seeing a doubling in users and traffic since the beginning of the year.

The use of virtual private networks (VPNs), a staple technology for remote work, has more than doubled in some countries impacted by the Cononavirus pandemic, as offices close, governments mandate social distancing, and workers move to remote work. 

One provider of VPN services, NordVPN, says it has seen 165% growth in the number of average daily users, up from an expansion of 40% just last week. Google has marked a six- to tenfold increase in searches for VPN-related queries since the beginning of the year. And other VPN providers, such as Atlas VPN, have seen a massive rise in the amount of data flowing through their networks, with Italian users more than doubling their use of that provider's network.

So far, the surge has not taxed the networks, says Rachel Welch, chief operating officer of Atlas VPN.

"We did see an increase in users, but that number is not significant enough to affect the traffic to such an extent," she says. "In short, people are starting to use VPNs a bit more, but users who were already using VPNs are the ones leaning toward a VPN more often day by day."

For many workers, especially gig workers and freelancers, VPN services are the most secure way to work online. The increased use of VPNs appears in step with the rise in cases of the Coronavirus in many countries. Atlas VPN says it has seen increases in traffic of anywhere from 9% to 112% in the past week in the seven countries hardest hit outside of China: Italy, Iran, South Korea, Spain, Germany, France, and the United States.

Businesses in those countries are ordering up new service as well, says Daniel Markuson, digital privacy specialist at NordVPN Teams.

"We see the increase due to more and more companies encouraging their employees to work from home, [and] many countries are also starting a quarantine," says Markuson. "Companies must provide their employees with appropriate tools, and one of those tools is a VPN."

In the past, only about a third of knowledge workers in the United States have worked remotely to some degree, according to a survey conducted by enterprise software firm Citrix. The Coronavirus pandemic has — and will continue to — change that, says Akhilesh Dhawan, director of product marketing for Citrix's Delivery Networks group.

"With increased calls and even government mandates to work from home, companies must quickly scale their VPN solutions to accommodate significantly greater demand for access from remote locations, and many are struggling to do so," he says. "There is a complex supply chain of ordering, procuring, and configuring an appliance involved, especially if it is hardware, and in many cases reduced IT staff available in the office to manage it."

While the increase could lead to bandwidth congestion in residential networks not used to midday traffic spikes, so far the increases have been manageable. 

The most significant issue for companies is whether employees' devices have been secured before they connect to internal networks, as well as the security of the services themselves. A flaw in the Pulse Secure VPN appliance led to several companies hit by ransomware attacks last year. And NordVPN suffered a privacy breach when a provider of datacenter services added additional accounts to its infrastructure.

While patching and securing their infrastructure is important, companies also need to focus on educating their employees on the secure use of VPNs, according to Aaron Zander, head of information technology at vulnerability-program provider HackerOne.

"Without a doubt, in 9 months from now, we'll be looking at news stories about two impacts resulting from COVID-19 --- all the babies being born, and all the breaches that have happened because of negligent infrastructure," he said in a statement. "A VPN breach is about as bad as you can get, the ability for someone to travel internally from VPN infrastructure into sensitive data is extremely easy."

Companies should make sure users know that VPNs are not enough to guarantee security, NordVPN said. 

"People should keep in mind that cybercriminals are well aware of the fact that many people are working from home. Attackers hope that these employees are leaving security gaps," the company predicted. "Sadly, cybercrime doesn't stop because of the quarantine. Therefore we encourage you to pay serious attention to proper cyber hygiene."

Related Content

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Security Lessons We've Learned (So Far) from COVID-19."

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Boris976
50%
50%
Boris976,
User Rank: Apprentice
3/27/2020 | 10:03:01 AM
Cyber Hygiene
"Breaches that happened due to negligent infrastructure" well said. The world definitely isn't prepared for the dangers that cyberattacks may soon cause. I was very nicely surprised to see that Atlas is giving away free VPN subscriptions during the whole epidemic. I am glad to join them and maintain my part of responsibility for securing the data. Hope that more people read this and understand the graveness of the situation.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Introducing 'Secure Access Service Edge'
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15001
PUBLISHED: 2020-07-09
An information leak was discovered on Yubico YubiKey 5 NFC devices 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1. The OTP application allows a user to set optional access codes on OTP slots. This access code is intended to prevent unauthorized changes to OTP configurations. The access code is not checked when u...
CVE-2020-15092
PUBLISHED: 2020-07-09
In TimelineJS before version 3.7.0, some user data renders as HTML. An attacker could implement an XSS exploit with maliciously crafted content in a number of data fields. This risk is present whether the source data for the timeline is stored on Google Sheets or in a JSON configuration file. Most T...
CVE-2020-15093
PUBLISHED: 2020-07-09
The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A ...
CVE-2020-15299
PUBLISHED: 2020-07-09
A reflected Cross-Site Scripting (XSS) Vulnerability in the KingComposer plugin through 2.9.4 for WordPress allows remote attackers to trick a victim into submitting an install_online_preset AJAX request containing base64-encoded JavaScript (in the kc-online-preset-data POST parameter) that is execu...
CVE-2020-4173
PUBLISHED: 2020-07-09
IBM Guardium Activity Insights 10.6 and 11.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure l...