ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™Insider Threat Matrix™
  • ID: PR031
  • Created: 23rd November 2025
  • Updated: 23rd November 2025
  • Contributor: The ITM Team

VPN Usage

The subject establishes an outbound Virtual Private Network (VPN) connection from an organizational endpoint (or Bring-Your-Own-Device system) to an external VPN provider, proxy service, or remote-hosted infrastructure. This behavior may occur during early preparation for data exfiltration, coordination with external parties, or operational concealment.

 

VPN usage can allow a subject to bypass enterprise monitoring, obscure the true destination of outbound traffic, or simulate trusted connections. In some cases, VPN tunnels are used to bridge otherwise segmented environments, enabling access to personal devices, unmanaged infrastructure, or overseas collaborators.