SHARE
Facebook X Pinterest WhatsApp

LevelBlue: VPN Gateways, Social Engineering Drove 2025 Attacks

Network and VPN flaws dominated 2025 attacks as threat actors bypassed authentication through social engineering, LevelBlue SpiderLabs reports.

Written By
thumbnail
Luis Millares
Luis Millares
Jan 9, 2026
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Network devices and VPN gateways were the most commonly exploited attack surfaces in 2025, as threat actors increasingly bypassed authentication by manipulating employees into granting access, according to LevelBlue SpiderLabs’ 2025 Threat Trends Analysis.

Multi-stage attacks blend phishing, voice calls, and extortion

According to the report, threat actors in 2025 increasingly bypassed defenses by convincing employees to grant access themselves, often without triggering traditional security alerts.

In particular, LevelBlue’s Incident Readiness and Response team highlighted three major campaigns and trends that in 2025:

  • A surge in multi-stage social engineering campaigns that escalate from phishing or phone calls into data theft and extortion
  • Widespread abuse of legitimate remote access and collaboration tools, helping attackers blend into normal enterprise activity
  • Increased use of psychological manipulation paired with technical exploitation by threat groups such as Luna Moth and Akira
Advertisement

Luna Moth targets law firms and financial institutions through fake IT support

Threat group Luna Moth was linked to numerous incidents involving data theft and extortion, with professional services organizations, including law firms and financial institutions, among its primary targets.

LevelBlue observed that the group’s operations often begin with a phishing email that impersonates a member of an organization’s internal IT or security team.

Victims are then directed to call a fake helpdesk number, where the threat actor convinces them to install or authorize remote access tools such as Zoho Assist or Atera. Once access is established, the group pivots to data exfiltration from the compromised device.

Following exfiltration, Luna Moth reportedly harasses and pressures victim organizations into paying a ransom.

Advertisement

Exploiting VPN vulnerabilities and SEO poisoning

The cybersecurity company also found that the Akira threat group was exploiting two vulnerabilities in SonicWall firewalls to gain initial access to organizations’ environments and then carry out follow-on attacks.

The report highlighted CVE-2024-40766 and CVE-2024-53704, both of which enabled cybercriminals to establish an initial foothold in targeted environments.

In addition, LevelBlue pointed to incidents of SEO poisoning, in which attackers planted spoofed domains in search engine results and used them to trick victims into installing a malicious version of RVTools.

Once the installer was executed, the Bumblebee malware was deployed, enabling attackers to move laterally, harvest credentials, and install persistent remote access tools.

Advertisement

Microsoft Quick Assist and Teams used to deliver ransomware

Finally, LevelBlue observed threat actors using Microsoft Quick Assist to conduct social engineering campaigns that ultimately led to ransomware deployment.

These attacks began with voice calls or Microsoft Teams messages from an external account, convincing victims that they were receiving technical support from their internal IT or security team.

During the interaction, the attacker persuaded the victim to launch Quick Assist and share access to their device. Because Quick Assist runs in the context of the logged-in user, granting access gave the attacker the same privileges as the victim.

From there, the threat actor executed malicious commands and deployed multiple persistence mechanisms on the compromised system.

Advertisement

LevelBlue urges defenders to prioritize behavioral detection

In light of these trends, LevelBlue expects attackers to continue leaning on social engineering to advance their campaigns, urging defenders to adapt by protecting against human-focused threats rather than relying solely on traditional defenses.

“While traditional threats, such as phishing and vulnerability exploitation, [persist], attackers increasingly rely on impersonation to achieve their goals,” LevelBlue said.

“Placing greater emphasis on focused behavioral detection rather than heuristics is necessary to remain vigilant and ahead of threat actors.”

Last year, we spoke with LevelBlue CIO Maria Cardow, who underscored the importance of recognizing people as a significant attack surface in modern cybersecurity strategies. Read more about her insights on how organizations can refocus on the human element to strengthen defenses and reduce risk.

thumbnail
Luis Millares

Luis Millares has extensive experience reviewing virtual private networks (VPNs), password managers, and other security software. He has tested and reviewed numerous forms of tech, covering consumer technology like smartphones and laptops, all the way to enterprise software and cybersecurity products. He has authored over 450 online articles on technology and has worked for the leading tech journalism site in the Philippines, YugaTech.com. He currently contributes to the Daily Tech Insider newsletter, providing well-researched insights and coverage of the latest in technology.

Recommended for you...

Video: Q4 and 2025 Annual IT Channel Recap: AI, VMware, Security & 2026 Outlook
Katie Bavoso
Jan 2, 2026
IGEL Finds Enterprises Are Cutting Endpoint IT Costs by 62%
Jordan Smith
Dec 26, 2025
Cybersecurity Experts Predict AI, Nation-State Threats in 2026
Jordan Smith
Dec 24, 2025
Fortra Warns Scripted Sparrow is Scaling Global BEC Attacks
Victoria Durgin
Dec 18, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.