Well, kids, let鈥檚 just say Santa鈥檚 workshop has a strict policy against being on the Naughty List. In the world of cybersecurity, that list includes some popular鈥攂ut perilous鈥攙irtual private networks (VPNs) and proxies. VPNs and proxies are tools that businesses use to secure and manage online activity. A VPN encrypts internet traffic and hides the user鈥檚 IP address, creating a secure "tunnel" between the user and the internet, which is great for protecting data on public Wi-Fi or enabling remote work. Proxies, on the other hand, act as intermediaries, routing traffic through another server to mask the user鈥檚 location or bypass restrictions. A lot of businesses rely on these tools for privacy, secure remote access, and to manage network traffic.聽
With 杏吧传媒 Managed Identity Threat Detection and Response (ITDR), we've uncovered a lineup of VPNs and proxies that businesses commonly use but come with more risks than rewards. Think more coal than cookies. From accepting dubious payment methods to shady logging practices, these tools could assist in identity-related holiday heists. Buckle up as we take a sleigh ride through the five riskiest VPNs and proxies (plus, a special mention) that even Santa wouldn鈥檛 trust to protect his list鈥攍et alone your business.
Why do these specific VPNs and proxies deserve a place on Santa鈥檚 Naughty List this year? Since releasing Unwanted Access鈥擬anaged ITDR鈥檚 capability that combats pervasive threats like session hijacking and credential theft鈥攚e鈥檝e noticed a few trends when it comes to certain VPNs/proxies and correlating abuse potential. And it all comes down to hacker useability.
Why it鈥檚 on the Naughty List: NordVPN鈥檚 widespread popularity, acceptance of anonymous payments like cryptocurrency, and strong privacy features make it a magnet for both legitimate users and cybercriminals. We see almost equal use split between legitimate users, policy violations, and actual cybercrime. And overall, NordVPN is the highest observed VPN by volume of incidents that we see by a wide margin (about 20% of all VPN-related incidents!)
Why it鈥檚 on the Naughty List: Mullvad VPN gains points for its adorable mascot, but even a cute mole can鈥檛 shake the VPN provider鈥檚 propensity for shadiness. Mullvad earns its spot on the list for its extreme focus on anonymity, allowing users to mail in cash payments and generate random account tokens. While these features make it a favorite for privacy enthusiasts, it鈥檚 also a favored tool for bad actors to evade accountability. Privacy may be a universal right, but cybercrime sure isn鈥檛.
Why it鈥檚 on the Naughty List: Meson.Network Proxy deserves its spot on the list because its decentralized, crypto-powered bandwidth-trading model creates an untraceable playground for cybercriminals to mask malicious activity and evade detection. Unlike other VPN providers like NordVPN, the 杏吧传媒 SOC rarely, if ever, sees legitimate use of this decentralized crypto-mining network in the SMB.
Why it鈥檚 on the Naughty List: IPRoyal Proxy makes the list because of its focus on residential proxies and granular location targeting鈥攃ombined with its acceptance of over 70 cryptocurrencies鈥攚hich provide cybercriminals with the perfect tools to obfuscate malicious activity and bypass detection. Many Identity Providers will not scrutinize traffic that comes from a similar geolocation as the victim user, so IPRoyal makes it easy for cybercriminals to remain under the radar.
Why it鈥檚 on the Naughty list: HMA earns its place on the list because of its history of cooperating with law enforcement (despite promises of anonymity), which underscores the risk of relying on providers whose privacy claims might crumble under pressure. Additionally, HMA secures itself as the fourth-highest observed VPN by incident volume! Cybercriminals still love it, maybe against their better judgment.
Why it鈥檚 on the Naughty List: While there are a handful of legitimate lines of work that benefit from a decentralized network of privacy-ensuring server nodes and multiple layers of encryption, your average user in the SMB really has no reason to go to such lengths in their day-to-day working life. TOR can be invaluable for those who work in journalism, political environments, or in the shadow of autocratic governments. But there鈥檚 generally no reason why your average frozen yogurt shop owner should be logging into their Outlook inbox from a TOR node.
As the snow settles on this cybersecurity sleigh ride, the takeaway is clear: not all VPNs and proxies are created equal, especially when it comes to safeguarding your business. While tools like NordVPN, Mullvad, and Meson.Network might boast shiny features, they also bring risks that could leave you exposed to more than just a frosty breeze. Whether through shady logging practices, hacker-friendly payment methods, or misuse by cybercriminals, these VPNs and proxies earned their spots on Santa鈥檚 Naughty List for 2025.聽
At 杏吧传媒, our mission is to help businesses navigate these risks with Managed ITDR, shining a light on the threats hiding in the shadows. So, this holiday season, if you鈥檙e looking to protect your business, make sure your cybersecurity strategy is on Santa鈥檚 Nice List鈥攁nd not under the hacker鈥檚 tree.
Get insider access to 杏吧传媒 tradecraft, killer events, and the freshest blog updates.