Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

3/19/2020
10:55 AM
100%
0%

VPN Usage Surges as More Nations Shut Down Offices

As social distancing becomes the norm, interest in virtual private networks has rocketed, with some providers already seeing a doubling in users and traffic since the beginning of the year.

The use of virtual private networks (VPNs), a staple technology for remote work, has more than doubled in some countries impacted by the Cononavirus pandemic, as offices close, governments mandate social distancing, and workers move to remote work. 

One provider of VPN services, NordVPN, says it has seen 165% growth in the number of average daily users, up from an expansion of 40% just last week. Google has marked a six- to tenfold increase in searches for VPN-related queries since the beginning of the year. And other VPN providers, such as Atlas VPN, have seen a massive rise in the amount of data flowing through their networks, with Italian users more than doubling their use of that provider's network.

So far, the surge has not taxed the networks, says Rachel Welch, chief operating officer of Atlas VPN.

"We did see an increase in users, but that number is not significant enough to affect the traffic to such an extent," she says. "In short, people are starting to use VPNs a bit more, but users who were already using VPNs are the ones leaning toward a VPN more often day by day."

For many workers, especially gig workers and freelancers, VPN services are the most secure way to work online. The increased use of VPNs appears in step with the rise in cases of the Coronavirus in many countries. Atlas VPN says it has seen increases in traffic of anywhere from 9% to 112% in the past week in the seven countries hardest hit outside of China: Italy, Iran, South Korea, Spain, Germany, France, and the United States.

Businesses in those countries are ordering up new service as well, says Daniel Markuson, digital privacy specialist at NordVPN Teams.

"We see the increase due to more and more companies encouraging their employees to work from home, [and] many countries are also starting a quarantine," says Markuson. "Companies must provide their employees with appropriate tools, and one of those tools is a VPN."

In the past, only about a third of knowledge workers in the United States have worked remotely to some degree, according to a survey conducted by enterprise software firm Citrix. The Coronavirus pandemic has — and will continue to — change that, says Akhilesh Dhawan, director of product marketing for Citrix's Delivery Networks group.

"With increased calls and even government mandates to work from home, companies must quickly scale their VPN solutions to accommodate significantly greater demand for access from remote locations, and many are struggling to do so," he says. "There is a complex supply chain of ordering, procuring, and configuring an appliance involved, especially if it is hardware, and in many cases reduced IT staff available in the office to manage it."

While the increase could lead to bandwidth congestion in residential networks not used to midday traffic spikes, so far the increases have been manageable. 

The most significant issue for companies is whether employees' devices have been secured before they connect to internal networks, as well as the security of the services themselves. A flaw in the Pulse Secure VPN appliance led to several companies hit by ransomware attacks last year. And NordVPN suffered a privacy breach when a provider of datacenter services added additional accounts to its infrastructure.

While patching and securing their infrastructure is important, companies also need to focus on educating their employees on the secure use of VPNs, according to Aaron Zander, head of information technology at vulnerability-program provider HackerOne.

"Without a doubt, in 9 months from now, we'll be looking at news stories about two impacts resulting from COVID-19 --- all the babies being born, and all the breaches that have happened because of negligent infrastructure," he said in a statement. "A VPN breach is about as bad as you can get, the ability for someone to travel internally from VPN infrastructure into sensitive data is extremely easy."

Companies should make sure users know that VPNs are not enough to guarantee security, NordVPN said. 

"People should keep in mind that cybercriminals are well aware of the fact that many people are working from home. Attackers hope that these employees are leaving security gaps," the company predicted. "Sadly, cybercrime doesn't stop because of the quarantine. Therefore we encourage you to pay serious attention to proper cyber hygiene."

Related Content

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Security Lessons We've Learned (So Far) from COVID-19."

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Boris976
50%
50%
Boris976,
User Rank: Apprentice
3/27/2020 | 10:03:01 AM
Cyber Hygiene
"Breaches that happened due to negligent infrastructure" well said. The world definitely isn't prepared for the dangers that cyberattacks may soon cause. I was very nicely surprised to see that Atlas is giving away free VPN subscriptions during the whole epidemic. I am glad to join them and maintain my part of responsibility for securing the data. Hope that more people read this and understand the graveness of the situation.
boholuxe
50%
50%
boholuxe,
User Rank: Apprentice
3/20/2020 | 7:11:26 AM
crazy busniess
The usage of vpn goes very fast up. I know several companies just exploded in several years doing vpn business
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19914
PUBLISHED: 2020-04-03
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2020-5283
PUBLISHED: 2020-04-03
ViewVC before versions 1.1.28 and 1.2.1 has a XSS vulnerability in CVS show_subdir_lastmod support. The impact of this vulnerability is mitigated by the need for an attacker to have commit privileges to a CVS repository exposed by an otherwise trusted ViewVC instance that also has the `show_subdir_l...
CVE-2020-11498
PUBLISHED: 2020-04-02
Slack Nebula through 1.1.0 contains a relative path vulnerability that allows a low-privileged attacker to execute code in the context of the root user via tun_darwin.go or tun_windows.go. A user can also use Nebula to execute arbitrary code in the user's own context, e.g., for user-level persistenc...
CVE-2020-11499
PUBLISHED: 2020-04-02
Firmware Analysis and Comparison Tool (FACT) 3 has Stored XSS when updating analysis details via a localhost web request, as demonstrated by mishandling of the tags and version fields in helperFunctions/mongo_task_conversion.py.
CVE-2020-7628
PUBLISHED: 2020-04-02
install-package through 1.1.6 is vulnerable to Command Injection. It allows execution of arbitrary commands via the device function.