Cybersecurity companies welcome Europol's latest VPN news

Europol has announced several law enforcement authorities dismantled a VPN service that was being utilized by cybercriminals in order to deploy ransomware

Cybersecurity companies have welcomed the news from Europol that several law enforcement authorities dismantled a VPN service that was being utilized by cybercriminals in order to deploy ransomware.

In a co-ordinated operation 12 law enforcement agencies from Germany, the Netherlands, Canada, the Czech Republic, France, Hungary, Latvia, Ukraine, the United States and the United Kingdom - seized or disrupted 15 servers that hosted the service of has been a highly popular choice for cyber criminals due to the ability to remain undetected from law enforcement. In the past, it has been advertised on the Dark Web as a valuable tool for criminals. 

Neil Jones, Cybersecurity Evangelist, Egnyte, says: "It is a breath of fresh air to see that international law enforcement is focusing their efforts on technology providers that offer cyber-attack-friendly environments and make it easy for Ransomware as a Service (RaaS) providers to perpetrate potential attacks. It is also a positive sign to see that the VPNLab operation spanned multiple European and North American countries, because it is extremely easy for a cyber-crime enterprise to wind down its operations in one country, only to re-emerge in another country. In this particular case, dozens of companies may have thwarted cyber-attacks.

"If a technology solution has a price that's too good to be true, evaluate it carefully before putting it into production at your organisation."

Steve Moore, chief security strategist, Exabeam, adds: "Twelve international organisations were involved in this specific action, and it took 60 meetings to pull off. 

"While we don’t know, it’s possible this VPN platform was used in recent attacks beyond ransomware. In parallel, the FSB claims they have arrested several members of the REvil ransomware gang: 25 homes owned by 14 members in several Russian cities. 

"What does this mean for the corporate defender? You might have felt alone for many years, and you probably still do, however, relationships matter more than ever. Major attacks require the engagement of law enforcement by defenders. Security teams need to educate their leadership on what this means, specifically as it affects the response timeline. Waiting for a more extensive and timed global action can mean a greater good, in short, patience.”  

How to prevent potential ransomware attacks

Egnyte's top four tips for preventing ransomware: 

1) Provide security awareness training to end-users, especially about the danger of phishing messages

2) Always utilise Multi-Factor Authentication (MFA)

3) Restrict users' file access, based on their "Business Need to Know"

4) Evaluate ransomware detection technology


Featured Articles

UK police cyberattack a reminder of third party risk

Cyber criminals use back-door suppliers cyberattack to spread alarm through Britain's biggest police force

Building Cyber Resilience into ‘OT in Manufacturing’ webinar

Join Acronis' webinar, Building Cyber Resilience into ‘OT in Manufacturing’, 21st September 2023

Trustwave report on hospitality industry security threats

Nearly 31% of hospitality organisations have reported a data breach in their company’s history, according to a Trustwave cybersecurity report

Barracuda Managed XDR uses AI to uncover cyber incidents

Technology & AI

Imperva: 32% of work data breaches could have been avoided

Operational Security

Supply chain cyberattacks seen as catastrophic for business

Cyber Security