Watchguard VPN Under Siege: Common Passwords Hackers Love and How to Block Them

Running any VPN without strong authentication is like leaving your front door wide open. Our honeypot just caught an attacker brute-forcing a Watchguard firewall VPN. Learn from our experience and ramp up your security game before ransomware gangs come knocking.

Hot Take:

Looks like ransomware gangs are out here playing “Guess Who?” with VPN credentials. Spoiler alert: the username isn’t “Robert” and the password isn’t “123456a%21.” It’s time to up your password game, folks!

Key Points:

  • Attackers are targeting VPN endpoints with weak authentication.
  • Honeypot detected brute force attempts on Watchguard firewall VPN.
  • Notable IP address involved: 185.122.204.102.
  • Commonly used usernames: “jason” and “robert.”
  • Numerous weak passwords identified, including “123456” and “password.”

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here