Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Research Uncovers Connection Between VPN Apps and Multiple Security Vulnerabilities

Posted on August 19, 2025August 19, 2025 By CWS

A complete safety evaluation has revealed alarming vulnerabilities affecting over 700 million customers throughout a number of VPN functions, exposing crucial flaws that compromise the very privateness and safety these providers promise to guard.

Analysis carried out by cybersecurity consultants from Arizona State College, Citizen Lab, and Bowdoin School has uncovered three distinct households of VPN suppliers that share not solely widespread possession but additionally harmful safety weaknesses that render consumer communications susceptible to interception and decryption.

The investigation recognized misleading practices amongst seemingly impartial VPN suppliers who intentionally obscure their possession whereas sharing similar cryptographic credentials and server infrastructure.

Strings output displaying references to the a number of VPN functions from supposedly distinct VPN suppliers (Supply – Petseymposium)

These suppliers, working underneath names equivalent to Modern Connecting, Autumn Breeze, and Lemon Clove, collectively distribute functions together with Turbo VPN, VPN Proxy Grasp, and Snap VPN, amongst others.

The analysis reveals that these apps include hard-coded Shadowsocks passwords that allow attackers to decrypt all consumer visitors transmitted by way of their networks.

Following in depth evaluation of utility binaries and community communications, Petsymposium analysts recognized that the safety flaws stem from elementary implementation errors in how these VPN functions deal with cryptographic supplies.

Laborious-coded keys in VPN Proxy Grasp allow a community eavesdropper decrypt visitors (Supply – Petseymposium)

Essentially the most crucial vulnerability entails hard-coded symmetric encryption keys embedded instantly throughout the utility code, saved in recordsdata equivalent to belongings/server_offline.ser and encrypted utilizing AES-192-ECB.

When VPN shoppers set up connections, they make the most of a local perform NativeUtils.getLocalCipherKey carried out within the shared library libopvpnutil.so to deterministically generate decryption keys.

The technical evaluation revealed that these functions make use of deprecated Shadowsocks configurations utilizing the susceptible rc4-md5 cipher suite, which lacks correct integrity checks and allows decryption oracle assaults.

Community visitors evaluation demonstrated that attackers possessing these hard-coded credentials can efficiently decrypt consumer communications in real-time, the place Shadowsocks passwords are seen in each runtime traces and reminiscence dumps.

An infection Mechanism and Credential Sharing Structure

The vulnerability exploitation mechanism facilities on the shared cryptographic infrastructure throughout supposedly distinct VPN suppliers.

Every affected utility comprises similar configuration recordsdata and shared libraries that reference a number of VPN functions inside their code construction.

The libopvpnutil.so library comprises specific references to numerous VPN package deal names, together with free.vpn.unblock.proxy.turbovpn, free.vpn.unblock.proxy.vpnmaster, and free.vpn.unblock.proxy.vpnmonster, indicating coordinated improvement and deployment throughout the supplier community.

When customers join to those VPN providers, the functions try and obtain distant configuration recordsdata earlier than falling again to the embedded hard-coded credentials saved in server_offline.ser.

This design allows attackers to enumerate extra VPN servers by testing the extracted passwords towards IP addresses throughout the similar community ranges, successfully mapping the complete infrastructure operated by these misleading suppliers.

The shared credential system additionally permits unauthorized entry to VPN providers, enabling attackers to ascertain unauthorized tunnels utilizing the extracted Shadowsocks parameters from any affected utility.

Enhance your SOC and assist your group defend your enterprise with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Apps, Connection, Multiple, Research, Security, Uncovers, VPN, Vulnerabilities

Post navigation

Previous Post: How Winning SOCs Always Stay Ahead of Threats 
Next Post: New Research Unmask DPRK IT Workers Email Address and Hiring Patterns

Related Posts

3 Key Benefits For SOCs And MSSPs  Cyber Security News
Microsoft Releases Emergency Fix for BitLocker Recovery Issue Cyber Security News
Linux 6.16 Released – Optimized for Better Performance and Networking Cyber Security News
APT41 Hackers Leveraging Atexec and WmiExec Windows Modules to Deploy Malware Cyber Security News
Microsoft Released an Emergency Security Update to Patch a Critical SharePoint 0-Day Vulnerability Cyber Security News
Scans From Hacked Cisco Small Business Routers, Linksys and Araknis are at the Raise Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
  • RingReaper Malware Attacking Linux Servers Evading EDR Solutions
  • Turning BIA Insights Into Resilient Recovery
  • Scaly Wolf Attacking Organizations to Uncover Organizations’ Secrets
  • Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
  • RingReaper Malware Attacking Linux Servers Evading EDR Solutions
  • Turning BIA Insights Into Resilient Recovery
  • Scaly Wolf Attacking Organizations to Uncover Organizations’ Secrets
  • Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News