IT Compliance for Non-Technical Executives

Ransomware Gangs Exploiting VPNs and EDR as Security Workarounds: What Ohio Business Leaders Need to Know

Written by Brent Kenreich | May 15, 2025 7:10:26 PM
With last year's ransomware attack on the City of Columbus, it's a good time to remind everyone that ransomware is out there, threatening businesses every day. It's not going away and for more and more businesses it's not a question of if, but when.
As cybercriminals become more sophisticated, traditional security measures like Virtual Private Networks (VPNs) and Endpoint Detection and Response (EDR) tools are increasingly being bypassed. For Ohio business leaders, understanding these evolving threats is crucial to safeguarding your organization's data and operations.

The Evolving Threat Landscape

Ransomware gangs are now exploiting vulnerabilities in VPNs and EDR systems to gain unauthorized access to corporate networks. For instance, Cisco's Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) VPNs were found to have a zero-day vulnerability that allowed attackers to conduct brute-force attacks against existing accounts, enabling unauthorized access to networks.

Similarly, ransomware groups have been observed exploiting remote access services, such as VPN and Remote Desktop Protocol (RDP), to gain initial access to corporate networks. This highlights the importance of securing remote access points and ensuring that all systems are up to date with the latest security patches.

How Attackers Bypass Security Measures

One of the tactics employed by ransomware gangs is the "Bring Your Own Driver" (BYOD) technique. This involves deploying a legitimate, vulnerable driver on targeted devices to escalate privileges, disable security solutions, and take control of the system. By exploiting these vulnerabilities, attackers can disable EDR tools and other security measures, making it easier to deploy ransomware and exfiltrate sensitive data.

Steps Your Ohio Business Can Take

To protect your organization from these evolving threats, consider implementing the following measures: 

 

In Ohio, where many businesses rely on legacy systems and infrastructure, it's particularly important to stay vigilant against these evolving threats. Collaborating with local cybersecurity experts, like us, and staying informed about the latest threat intelligence can help Ohio business strengthen their defenses against ransomware attacks.

By understanding the tactics employed by ransomware gangs and taking proactive steps to secure your organization's systems, you can better protect your business from these evolving cyber threats. 

Maintaining Vigilance and Best Practices

Ransomware protection is not a one-time task but a continuous process. It requires constant vigilance, regular updates, and adherence to best cybersecurity practices. Remember, the landscape of cyber threats is ever evolving. Stay informed about the latest ransomware threats and trends. Implement the tips discussed in this guide and maintain a proactive approach to safeguard your digital assets against ransomware attacks. For more on ransomware prevention, remediation or if you want to know if your organization is at risk, check out our page.
 
If you think you have been the victim of a ransomware attack and need help, contact us for assistance.