Yotam Gurtman
29-12-2025
Remote work has amplified insider threats by extending VPN-based access beyond the perimeter. When credentials become the only gate, disgruntled or compromised insiders can exfiltrate data at scale—turning trusted access into a breach path.
In a hybrid world, employees, contractors, and admins can reach sensitive systems from anywhere. And for many organizations, the default mechanism is still the same: a VPN tunnel gated by a username and password (sometimes plus MFA). That approach is convenient, but it can quietly turn identity into the **first—and sometimes only—line of defense.
The result: when a trusted user becomes disgruntled, careless, compromised, or simply about to leave, the path to critical data may be as simple as “log in like normal.”
Insider risk isn’t a niche issue. Multiple recent surveys point to it as a mainstream problem affecting most organizations:
Those numbers matter for one simple reason: VPN access extends the impact of insider actions. If a user can reach internal file shares, dev repositories, ticketing systems, or admin consoles from home remote, they can bypass traditional security controls and exfiltrate sensitive data.
VPNs were built to solve a connectivity problem: “Make a remote device feel like it’s on the corporate network.” That design choice has security consequences:
Some recent incidents illustrate a recurring theme: legitimate access paths (accounts, passwords, remote connectivity) are often all that’s needed.
In a widely reported case, Intel sued a former employee accused of exfiltrating a massive volume of sensitive files shortly before departure. According to several sources, the employee allegedly downloaded ~18,000 sensitive files near the end of July 2024, after receiving termination notice earlier that month. A first attempt was reportedly blocked by DLP controls, but a later transfer succeeded. He allegedly used of a network-attached storage (NAS) device connected to the work laptop/account to pull the files, meaning he had maintained remote connection after being terminated (PC Gamer).
Government contractor Opexus fired employees, and one of the individuals allegedly remotely accessed the company network minutes after termination, then proceeded to delete large volumes of databases and copy sensitive files tied to federal agencies. The reporting also highlights the company later acknowledging it failed to ensure the individuals could no longer access systems immediately upon termination. (CyberScoop)
In a July 2025 incident involving Brazil’s PIX instant payment ecosystem, an employee at C&M Software allegedly sold his login credentials to hackers. Reporting says the attackers guided him through steps including creating separate accounts and enabling remote access contributing to theft reportedly exceeding $100M. (The Record from Recorded Future)
TSMC employees (and at least one former employee) were arrested over allegations related to stolen intellectual proprietary and details of advanced chip development. The reporting notes this was tied to Taiwan’s amended National Security Act, with potential penalties including up to 12 years in jail and significant fines. (Tom's Hardware)
Across these incidents, the consistent problem is that organizations treat authentication as authorization. VPNs made remote work possible at scale- but they also made it easier for insiders (and insider-enabled attackers) to operate with speed, anonymity, and reach.
ZeroPort Fantom Edge is a hardware-enforced, non-IP connection at the network boundary, eliminating the risk of credential abuse and data exfiltration and theft by rogue employees. Contact ZeroPort today to schedule a demo.
Empower global teams with secure, hardware-enforced remote access, no VPNs, no data exposure, no risk.