Anatomy of a Breach

Anatomy of a Breach: COVID-19 — The Pandemic That Expanded the Global Attack Surface Overnight

> series: anatomy_of_a_breach —— part: 135 —— event: covid-19_pandemic —— impact: largest_attack_surface_expansion_in_history<span class="cursor-blink">_</span>_

Hedgehog Security 31 March 2020 14 min read

Millions working from home. Personal devices. Hastily deployed VPNs. The attack surface exploded.

In March 2020, the COVID-19 pandemic triggered nationwide lockdowns across the UK, Europe, and much of the world. Within weeks, millions of workers transitioned from office-based environments — with managed networks, firewalls, and physical security — to home working environments with consumer broadband, personal devices, shared home networks, and hastily configured VPN access. For cybersecurity, the pandemic represented the largest, fastest expansion of the global attack surface in history.

Attackers responded immediately. Phishing campaigns exploiting COVID-19 surged — with emails impersonating the WHO, NHS, government agencies, and health authorities. RDP exposure on the internet increased by 127% as organisations hastily enabled remote access. VPN appliances — many running the same Pulse Secure vulnerability that had compromised Travelex — became critical targets. And video conferencing platforms, particularly Zoom, faced intense scrutiny as they went from niche tools to essential infrastructure overnight.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Every home became a branch office. Without branch office security.

Home Networks Are Not Corporate Networks
Home broadband connections, consumer routers, shared family devices, and unmanaged personal computers replaced segmented corporate networks with managed endpoints. <a href="/cyber-essentials">Cyber Essentials Danzell</a> addresses remote working security — including home working device requirements and MFA mandates — precisely because COVID-19 proved these controls are essential.
RDP Exposure Surged
Organisations that could not deploy VPNs quickly enough exposed RDP directly to the internet — the same vulnerability that enabled the <a href="/blog/anatomy-of-a-breach-atlanta-samsam">Atlanta SamSam attack</a> (2018). Our <a href="/vulnerability-scanning">external vulnerability scanning</a> identifies exposed RDP and remote access services.
COVID-19 Phishing Epidemic
Phishing campaigns exploiting pandemic fear — fake NHS test results, WHO guidance, government relief programmes — surged dramatically. Our <a href="/penetration-testing/social-engineering">social engineering assessments</a> test staff resilience to current threat themes.
VPN Becomes Critical Infrastructure
VPN appliances became the primary perimeter for millions of organisations. Unpatched VPN vulnerabilities — like the Pulse Secure flaw that hit <a href="/blog/anatomy-of-a-breach-2019-year-review">Travelex</a> — became existentially critical. <a href="/vulnerability-scanning">Vulnerability scanning</a> identifies unpatched VPN appliances. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors VPN access patterns for anomalies.

Remote working is permanent. So is the expanded attack surface.

COVID-19 was not a temporary disruption — it permanently changed how organisations operate. Hybrid and remote working became the default for millions. The expanded attack surface — home networks, personal devices, VPN dependencies, cloud-first architectures — is now the permanent reality. Security controls must adapt accordingly.

Cyber Essentials Danzell addresses remote working security requirements. Our infrastructure testing includes remote access security assessment. Social engineering testing addresses pandemic-themed phishing. SOC in a Box monitors the expanded perimeter — VPN, cloud, and remote access — 24/7. And UK Cyber Defence provides incident response across distributed environments.


COVID-19 expanded your attack surface permanently. Has your security expanded to match?

<a href="/cyber-essentials">Cyber Essentials</a> covers remote working. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> assesses VPN and remote access. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors the expanded perimeter.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles