{"id":231156,"date":"2026-01-08T08:55:46","date_gmt":"2026-01-08T08:55:46","guid":{"rendered":"https:\/\/www.intrinsec.com\/?p=231156"},"modified":"2026-01-08T08:55:47","modified_gmt":"2026-01-08T08:55:47","slug":"vpn-compromises-real-word-use-cases","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/vpn-compromises-real-word-use-cases\/","title":{"rendered":"From VPN Compromise to Ransomware: 5 Real-World Incident Response Scenarios"},"content":{"rendered":"<h3 class=\"wp-block-heading\" id=\"h-context\">Context<\/h3>\n\n\n\n<p>Depending on the threat actor you are dealing with, the answer to that question might differ: <strong>Initial Access Brokers (IAB)<\/strong> will often step down in favor of other attackers as soon as they have achieved access theft. <strong>Ransomware operators<\/strong> would go straight to their goal: exfiltration and encryption. <strong>Advanced Persistent Threat<\/strong> on their side might answer <em>as far as we can without being spotted<\/em>.<\/p>\n\n\n\n<p>As many VPN appliances, by their very nature exposed on the Internet, are subject to <strong>vulnerabilities<\/strong> and <strong>poor configuration<\/strong> (lack of MFA, legacy accounts, weak password policy, etc.), the challenge is to prevent threat actors from exploiting these flaws and, if they do, to <strong>prevent them from carrying out their attacks<\/strong>. It can be very complex due to number of factors: vulnerabilities being exploited well before publication, editors not releasing patches immediately, bypassing of these patches, lack of information related to the vulnerabilities, lack of monitoring of vulnerable devices, etc.<\/p>\n\n\n\n<p>Besides, compromises of this nature do <strong>not only concern devices in production<\/strong> at the time vulnerabilities are published, but also all legacy devices that are often less or not monitored. For instance, when deploying a new instance, system updates must be applied as well as security patches. Otherwise, the new instance might be up-to-date but vulnerable.<\/p>\n\n\n\n<p>We will present, in this paper, <strong>five cases encountered several times by CERT Intrinsec<\/strong>, during its incident response engagements, which highlight the weaknesses observed and potential solutions to prevent this type of situation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cert-intrinsec-presentation\"><a href=\"#cert-intrinsec-presentation\"><\/a>CERT Intrinsic presentation<\/h3>\n\n\n\n<p>CERT Intrinsec is a French incident response team that performs its operation mainly on the French sector. The team deals with about <strong>50 major incidents per year<\/strong> and works to help its customers to recover from cyber-attacks and strengthen their security. Since 2017, CERT Intrinsec has responded to <strong>of hundreds of security breaches involving companies and public entities<\/strong>. The majority of those incidents are related to cybercrime and ransomware attacks with financial objectives, hence, CERT Intrinsec follows those groups activities and generates comprehensive intelligence from the field. ANSSI (French National Security Agency) granted CERT Intrinsec <strong>PRIS (State-Certified Security Incident Response Service Providers) certification<\/strong>. The latter testify that CERT Intrinsec meets specific incident response requirements, using dedicated procedures, qualified people and appropriate infrastructures.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-far-will-the-compromise-take-us\"><a href=\"#how-far-will-the-compromise-take-us\"><\/a>How far will the compromise take us?<\/h3>\n\n\n\n<p>As the patch cycle differs from a company to another, each of them may find themselves in different situations when it comes to VPN compromised. All of the scenarios below describe these situations.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-scenario-1-vulnerability-monitoring-and-early-compromise-assessment\"><a href=\"#scenario-1---vulnerability-monitoring-and-early-compromise-assessment\"><\/a>Scenario 1 \u2013 Vulnerability monitoring and early compromised assessment<\/h4>\n\n\n\n<p>In the best-case scenario, the security team <strong>monitors vulnerabilities<\/strong>, especially on exposed devices, is able to <strong>Run update and patch quickly<\/strong> and is able to perform <strong>investigation<\/strong> on its own devices. Besides, it follows the <strong>editor&#039;s publications<\/strong> to monitor measures taken to mitigate the vulnerability.<\/p>\n\n\n\n<p>Finally, it is able to <strong>conduct threat hunting<\/strong> on its information system to look for indicators of compromise related to vulnerabilities post exploitation. They ask from time to time a <strong>compromise assessment<\/strong> to its security service provider.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"481\" height=\"109\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_1.png\" alt=\"\" class=\"wp-image-231158\" srcset=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_1.png 481w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_1-300x68.png 300w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_1-18x4.png 18w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><\/figure>\n<\/div>\n\n\n<p>The key here is the ability to <strong>take action as fast as possible<\/strong> and deal with the <strong>three main locks when it comes to security<\/strong>: <strong>human<\/strong> (not enough people to monitor information system and vulnerabilities), <strong>budgetary<\/strong> (not enough money to conduct a compromised assessment or to replace a piece of device) and <strong>procedural<\/strong> (no clear division of tasks and roles).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-scenario-2-exploited-appliance-and-early-remediation\"><a href=\"#scenario-2---exploited-appliance-and-early-remediation\"><\/a>Scenario 2 \u2013 Exploited appliance and early remediation<\/h4>\n\n\n\n<p>In this case, the vulnerability issue is handled but <strong>with a little delay<\/strong>. Thus, exploitation attempts might have been conducted on the device. When the security team realizes that the vulnerable appliance could be compromised, it would conduct <strong>compromised assessment not only on the device<\/strong>, but on the perimeter accessible from the appliance as well, to verify if any post exploitation actions are taking place.<\/p>\n\n\n\n<p>It should look for <strong>multiple kinds of evidence<\/strong>, including <strong>system<\/strong> compromised, suspicious or malicious <strong>network flows<\/strong>, either internal or external, but also <strong>suspicious accounts<\/strong> used by or on the compromised appliance.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"430\" height=\"119\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_2-1.png\" alt=\"\" class=\"wp-image-231159\" srcset=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_2-1.png 430w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_2-1-300x83.png 300w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_2-1-18x5.png 18w\" sizes=\"(max-width: 430px) 100vw, 430px\" \/><\/figure>\n<\/div>\n\n\n<h4 class=\"wp-block-heading\" id=\"h-scenario-3-discovery-and-lateral-movement-time\"><a href=\"#scenario-3---discovery-and-lateral-movement-time\"><\/a>Scenario 3 \u2013 Discovery and lateral movement time<\/h4>\n\n\n\n<p>Post-exploitation is underway. The SonicWall VPN appliance affected by <strong>multiple vulnerabilities<\/strong> has been compromised and the attacker created <strong>two local accounts<\/strong> on it (1). He then tried to <strong>connect to multiple servers using compromised accounts<\/strong> (2), he used <strong>PsExec<\/strong> tool to test its access to a first domain controller (3). Later on, he moved laterally using <strong>Remote Desktop Protocol<\/strong> (RDP) to a development server (4). Finally, he used <em><strong>systeminfo<\/strong><\/em> command to gather information about that same server (5).<\/p>\n\n\n\n<p>All the malicious actions were carried out <strong>in less than an hour<\/strong>. The compromise was discovered by <strong>detecting the use of PsExec tool<\/strong> on the domain controller. Containment actions were taken quickly and digital forensic investigations were undertaken to find out the <strong>extent of the compromise<\/strong>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"780\" height=\"486\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_3.png\" alt=\"\" class=\"wp-image-231160\" style=\"width:798px;height:auto\" srcset=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_3.png 780w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_3-300x187.png 300w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_3-768x479.png 768w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_3-18x12.png 18w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_3-650x405.png 650w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/><\/figure>\n<\/div>\n\n\n<h4 class=\"wp-block-heading\" id=\"h-scenario-4-credentials-collection-party\"><a href=\"#scenario-4---credentials-collection-party\"><\/a>Scenario 4 \u2013 Credentials collection party<\/h4>\n\n\n\n<p><em>Can we go further?<\/em> Here comes <em>credentials harvesting<\/em> and <em>large-scale compromise<\/em>.<\/p>\n\n\n\n<p>In this very case, the threat actor first exploited the <strong>CVE-2024-55591 Fortinet vulnerability<\/strong> (1). This vulnerability allows an attacker to <strong>bypass authentication<\/strong> of FortiOS administration interface and to gain <strong>administrator privileges<\/strong> by sending crafted queries to the websocket module.<\/p>\n\n\n\n<p>Three months later, as a <strong>Security Operation Center<\/strong> (SOC) was being deployed, multiple alerts were raised about potential data exfiltrations.<\/p>\n\n\n\n<p>We found out that the attacker connected to the network using a <strong>compromised account<\/strong> through the Fortinet VPN and accessed to the <strong>primary domain controller<\/strong> (2) via <strong>Remote Desktop Protocol<\/strong> (RDP). Within 3 minutes, he dumped <strong>Active Directory NTDS database<\/strong> and exfiltrate it to his remote server (3). He then disconnected 6 minutes later.<\/p>\n\n\n\n<p>Four hours later, the attacker came back and performed a <strong>ping scan on a specific network range<\/strong> from his VPN session (4). He then waited two more hours before starting to connect to multiple servers: domain controller, filer, backup, etc. (5). He collected registry hives on the backup server.<\/p>\n\n\n\n<p>On the next day, the threat actor continues his <strong>credential harvesting process<\/strong> by repeating it on <strong>hypervisors, administration and support servers<\/strong> (6).<\/p>\n\n\n\n<p><strong>Two days after the start of post exploitation actions<\/strong>, the alert is raised and containment measures are applied on accounts, servers and networks.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"638\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_4-1024x638.png\" alt=\"\" class=\"wp-image-231161\" srcset=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_4-1024x638.png 1024w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_4-300x187.png 300w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_4-768x478.png 768w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_4-18x12.png 18w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_4-650x405.png 650w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_4.png 1159w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<h4 class=\"wp-block-heading\" id=\"h-scenario-5-from-weak-vpn-to-ransomware-attack\"><a href=\"#scenario-5---from-weak-vpn-to-ransomware-attack\"><\/a>Scenario 5 \u2013 From weak VPN to ransomware attack<\/h4>\n\n\n\n<p>The worst-case scenario is the compromised or use of the VPN appliance compromised leading to ransomware attacks.<\/p>\n\n\n\n<p>In this case, the attacker was able to get a <strong>VPN session using a compromised account<\/strong>. (1) He then connected to a <strong>VEEAM backup server<\/strong> and exploited the <strong>CVE-2024-40711<\/strong> deserialization vulnerability (2) and thus, <strong>created a local account<\/strong> on the server (3). After ensuring its persistence, he <strong>scanned network shares and devices<\/strong> from his VPN session (4), writing the results in text files.<\/p>\n\n\n\n<p>He then decided to move laterally to two different servers: an <strong>hypervisor<\/strong> via Remote Desktop Protocol (RDP) using a <strong>compromised domain administrator account<\/strong> (5), and a business server where he not only added another persistence (6), installing <strong>AnyDesk<\/strong> solution, but also installed <strong>RClone<\/strong> cloud synchronization tool in order to exfiltrate data (7).<\/p>\n\n\n\n<p>Finally, he browsed <strong>network shares and folders<\/strong> (8), before <strong>listing hypervisors and virtual machines<\/strong> (9) available on the information system and <strong>deploying his ransomware<\/strong> binary (10).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"930\" height=\"568\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_5.png\" alt=\"\" class=\"wp-image-231162\" srcset=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_5.png 930w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_5-300x183.png 300w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_5-768x469.png 768w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_5-18x12.png 18w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/vpn_5-650x397.png 650w\" sizes=\"(max-width: 930px) 100vw, 930px\" \/><\/figure>\n<\/div>\n\n\n<p><em><strong>It is important to state that VPN compromises are not only due to vulnerability exploitation but also to weak configuration (authentication flow, password policies, multi-factor authentication, local accounts, etc.).<\/strong><\/em> For instance, we came across a case where an attacker was able to authenticate with any of VPN group names, as an identifier, without needing any password.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-insights-about-hardening-and-configuration\"><a href=\"#insights-about-hardening-and-configuration\"><\/a>Insights about hardening and configuration<\/h3>\n\n\n\n<p>As we saw in these five cases, lack of security allows threat actors to go even further in their attacks. It is possible to <strong>increase the level of security<\/strong> to avoid or prevent these attacks. Regarding the exploitation of vulnerabilities on VPN appliance, it is possible to build an efficient <strong>patch management along with a monitoring process<\/strong> that enables the most critical vulnerabilities on the most important devices to be identified as quickly as possible. As editors might not release patches right away or the latter might be bypassed, it is important to <strong>monitor the evolution<\/strong> of interesting information related to critical vulnerabilities (editor&#039;s solutions, indicators of compromise, hunting opportunities and so on).<\/p>\n\n\n\n<p>There are more common ways to reduce the attack surface. First, <strong>avoid exposing administration or management interfaces<\/strong> to the Internet prevents attackers from exploiting vulnerabilities leveraging these interfaces. <strong>Multi-factor authentication (MFA) is the cornerstone of remote access security<\/strong>. Indeed, some kind of vulnerabilities, like CVE-2019-13379, allows attackers to get access to credentials, but you can prevent them from accessing your network if MFA is implemented. Besides, threat actors can end up with stolen credentials, that they can use on VPN appliance, from several sources (leaks, credentials stealers, phishing, etc.).<\/p>\n\n\n\n<p>If an attacker breaks into your network, you can make his job harder by <strong>reducing user privileges to what is strictly necessary<\/strong> and <strong>review accesses on a regular basis<\/strong>. You should delete as well <strong>local legacy accounts<\/strong> on VPN appliances that are not used anymore, to prevent an attacker from using it.<\/p>\n\n\n\n<p>Finally, you can set up <strong>Geo IP restriction<\/strong> on your VPN appliances and set <strong>strong password policies<\/strong>, both locally and with all other authentication methods (Active Directory, etc.).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-insights-about-monitoring\"><a href=\"#insights-about-monitoring\"><\/a>Insights about monitoring<\/h3>\n\n\n\n<p>When it comes to monitoring, we think first of <strong>indicators of compromise<\/strong> (IOC) available, either from the editor or from security research companies. These IOCs can be linked to the vulnerability <strong>exploitation itself<\/strong> or to <strong>intrusion sets<\/strong> operated once vulnerability has been exploited.<\/p>\n\n\n\n\n\n<p>More specifically, by <strong>monitoring system logs<\/strong>, you will be able to detect suspicious account creation, group change, unusual connections and so on.<\/p>\n\n\n\n<p>During few CERT Intrinsec incident response engagements, companies were in the <strong>process of migrating from one VPN solution to another<\/strong>. Sometimes, this process takes quite a long time and legacy instances remain up even if they are not used anymore. It is important to keep an up-to-date inventory of exposed equipment. Year <strong>external assets security monitoring (EASM)<\/strong> can be useful to identify overlooked devices or solutions that might be vulnerable.<\/p>\n\n\n\n<p>Finally, it is essential to <strong>continue monitoring after patching<\/strong>, and to reset or rebuild appliances because patches may be subject to bypass.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-insights-about-investigation\"><a href=\"#insights-about-investigation\"><\/a>Insights about investigation<\/h3>\n\n\n\n<p>When Security Operation Center (SOC) or local security team finds some evidence of VPN appliance compromised, it might request a <strong>compromise assessment<\/strong> on the impacted perimeter.<\/p>\n\n\n\n<p>The incident response team should already be aware of that vulnerabilities and able to conduct forensic investigations. Tea <strong>knowledge<\/strong> is based on editor&#039;s <strong>publications<\/strong>, <strong>proof of concept<\/strong>, previous <strong>commitments<\/strong> related to the same vulnerability, <strong>indicators of compromise<\/strong> from post exploitation intrusion set, <strong>researches<\/strong> on forensic artifacts or specific logs and how to exploit them, closed sources, etc.<\/p>\n\n\n\n<p>Not to forget that the assessment should not only rely on forensic data collection, but <strong>should take advantage of all the security and monitoring solutions available on the perimeter<\/strong> (SIEM, EDR, XDR, cloud consoles, etc.). The availability of the network logs is often a weak spot when conducting forensic investigations. That is why you should make sure that these elements are <strong>properly stored, accessible and usable<\/strong>.<\/p>\n\n\n\n<p>When it comes to VPN appliances, resources available to investigate can vary a lot. You should then rely on <strong>editor&#039;s documentation<\/strong>, available <strong>command lines<\/strong> and <strong>diagnostic tools<\/strong> (Internal and External Integrity Checker (ICT) for Ivanti, Tech Support File (TSF) for Palo Alto, etc.). You should check as well <strong>configuration<\/strong>, users, groups, network rules and so on.<\/p>\n\n\n\n<p>Finally, it is important to analyze <strong>areas of the information system that are accessible from a VPN session or from the device itself<\/strong>, depending on the incident, performing system and network analysis.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-insights-about-rebuilding\"><a href=\"#insights-about-rebuilding\"><\/a>Insights about rebuilding<\/h3>\n\n\n\n<p>Finally, if post exploitation has been going on after vulnerable exploitation, some <strong>containment and remediation actions<\/strong> must be taken, sometimes quite substantial. It is possible to prepare these actions by having a new <strong>information system core ready for reconstruction<\/strong> with virtual machine templates, backups, spare domain controller and hypervisor.<\/p>\n\n\n\n<p>In any case, it is very important to conduct <strong>forensic collection process before any remediation actions<\/strong> impacting evidences, otherwise the compromised assessment will not be possible.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-conclusion\"><a href=\"#conclusion\"><\/a>Conclusion<\/h3>\n\n\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Context Depending on the threat actor you are dealing with, the answer to that question [\u2026]<\/p>","protected":false},"author":48,"featured_media":231163,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[176],"class_list":["post-231156","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cert","tag-incident-response"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>VPN Compromise to Ransomware: 5 Incident Response Scenarios<\/title>\n<meta name=\"description\" content=\"Discover 5 real VPN compromise cases from CERT Intrinsec. Learn vulnerability fixes, weak config risks &amp; prevention for ransomware threats\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/vpn-compromises-real-word-use-cases\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From VPN Compromise to Ransomware: 5 Real-World Incident Response Scenarios\" \/>\n<meta property=\"og:description\" content=\"Discover 5 real VPN compromise cases from CERT Intrinsec. Learn vulnerability fixes, weak config risks &amp; prevention for ransomware threats\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/vpn-compromises-real-word-use-cases\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-08T08:55:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-08T08:55:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/franchement.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alexandre CARLE\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandre CARLE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/vpn-compromises-real-word-use-cases\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/vpn-compromises-real-word-use-cases\\\/\"},\"author\":{\"name\":\"Alexandre CARLE\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/959a26630baf863951ac62fe95348da4\"},\"headline\":\"From VPN Compromise to Ransomware: 5 Real-World Incident Response Scenarios\",\"datePublished\":\"2026-01-08T08:55:46+00:00\",\"dateModified\":\"2026-01-08T08:55:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/vpn-compromises-real-word-use-cases\\\/\"},\"wordCount\":2119,\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/vpn-compromises-real-word-use-cases\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/franchement.png\",\"keywords\":[\"Incident Response\"],\"articleSection\":[\"CERT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/vpn-compromises-real-word-use-cases\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/vpn-compromises-real-word-use-cases\\\/\",\"name\":\"VPN Compromise to Ransomware: 5 Incident Response Scenarios\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/vpn-compromises-real-word-use-cases\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/vpn-compromises-real-word-use-cases\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/franchement.png\",\"datePublished\":\"2026-01-08T08:55:46+00:00\",\"dateModified\":\"2026-01-08T08:55:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/959a26630baf863951ac62fe95348da4\"},\"description\":\"Discover 5 real VPN compromise cases from CERT Intrinsec. Learn vulnerability fixes, weak config risks & prevention for ransomware threats\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/vpn-compromises-real-word-use-cases\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/vpn-compromises-real-word-use-cases\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/vpn-compromises-real-word-use-cases\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/franchement.png\",\"contentUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/franchement.png\",\"width\":1536,\"height\":1024,\"caption\":\"VPN\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/vpn-compromises-real-word-use-cases\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From VPN Compromise to Ransomware: 5 Real-World Incident Response Scenarios\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/959a26630baf863951ac62fe95348da4\",\"name\":\"Alexandre CARLE\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c2d2a058f1b5661647b6819364549dcc24895d48f7c3752cc81482626123d788?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c2d2a058f1b5661647b6819364549dcc24895d48f7c3752cc81482626123d788?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c2d2a058f1b5661647b6819364549dcc24895d48f7c3752cc81482626123d788?s=96&d=retro&r=g\",\"caption\":\"Alexandre CARLE\"},\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/abc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"VPN Compromise to Ransomware: 5 Incident Response Scenarios","description":"Discover 5 real VPN compromised cases from CERT Intrinsec. Learn vulnerability fixes, weak config risks &amp; prevention for ransomware threats","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/vpn-compromises-real-word-use-cases\/","og_locale":"en_US","og_type":"article","og_title":"From VPN Compromise to Ransomware: 5 Real-World Incident Response Scenarios","og_description":"Discover 5 real VPN compromise cases from CERT Intrinsec. Learn vulnerability fixes, weak config risks & prevention for ransomware threats","og_url":"https:\/\/www.intrinsec.com\/en\/vpn-compromises-real-word-use-cases\/","og_site_name":"INTRINSEC","article_published_time":"2026-01-08T08:55:46+00:00","article_modified_time":"2026-01-08T08:55:47+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/franchement.png","type":"image\/png"}],"author":"Alexandre CARLE","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alexandre CARLE","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/vpn-compromises-real-word-use-cases\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/vpn-compromises-real-word-use-cases\/"},"author":{"name":"Alexandre CARLE","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/959a26630baf863951ac62fe95348da4"},"headline":"From VPN Compromise to Ransomware: 5 Real-World Incident Response Scenarios","datePublished":"2026-01-08T08:55:46+00:00","dateModified":"2026-01-08T08:55:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/vpn-compromises-real-word-use-cases\/"},"wordCount":2119,"image":{"@id":"https:\/\/www.intrinsec.com\/vpn-compromises-real-word-use-cases\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/franchement.png","keywords":["Incident Response"],"articleSection":["CERT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/vpn-compromises-real-word-use-cases\/","url":"https:\/\/www.intrinsec.com\/vpn-compromises-real-word-use-cases\/","name":"VPN Compromise to Ransomware: 5 Incident Response Scenarios","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intrinsec.com\/vpn-compromises-real-word-use-cases\/#primaryimage"},"image":{"@id":"https:\/\/www.intrinsec.com\/vpn-compromises-real-word-use-cases\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/franchement.png","datePublished":"2026-01-08T08:55:46+00:00","dateModified":"2026-01-08T08:55:47+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/959a26630baf863951ac62fe95348da4"},"description":"Discover 5 real VPN compromised cases from CERT Intrinsec. Learn vulnerability fixes, weak config risks &amp; prevention for ransomware threats","breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/vpn-compromises-real-word-use-cases\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/vpn-compromises-real-word-use-cases\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intrinsec.com\/vpn-compromises-real-word-use-cases\/#primaryimage","url":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/franchement.png","contentUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/franchement.png","width":1536,"height":1024,"caption":"VPN"},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/vpn-compromises-real-word-use-cases\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"From VPN Compromise to Ransomware: 5 Real-World Incident Response Scenarios"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/959a26630baf863951ac62fe95348da4","name":"Alexandre CARLE","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c2d2a058f1b5661647b6819364549dcc24895d48f7c3752cc81482626123d788?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c2d2a058f1b5661647b6819364549dcc24895d48f7c3752cc81482626123d788?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c2d2a058f1b5661647b6819364549dcc24895d48f7c3752cc81482626123d788?s=96&d=retro&r=g","caption":"Alexandre CARLE"},"url":"https:\/\/www.intrinsec.com\/en\/author\/abc\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/231156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/48"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=231156"}],"version-history":[{"count":4,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/231156\/revisions"}],"predecessor-version":[{"id":231170,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/231156\/revisions\/231170"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media\/231163"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=231156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=231156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=231156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}