Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Research Links VPN Apps, Highlights Security Deficiencies

Posted on August 19, 2025August 19, 2025 By CWS

Almost two dozen VPN functions in Google Play comprise safety weaknesses impacting the privateness of their customers, exposing transmitted information to decryption, a brand new Citizen Lab report reveals.

Moreover, the VPN suppliers that provide these functions could be linked to 1 one other, though they declare to be separate entities and use numerous means to cover their true identities.

Ranging from earlier reviews linking Revolutionary Connecting, Autumn Breeze, and Lemon Clove, three VPN suppliers claiming to be primarily based in Singapore, to a Chinese language nationwide, Citizen Lab’s evaluation recognized further connections between their functions, and linked different VPN apps and their suppliers.

In keeping with Citizen Lab’s report (PDF), eight VPN functions from Revolutionary Connecting, Autumn Breeze, and Lemon Clove share code, dependencies, and hardcoded passwords, doubtlessly permitting attackers to decrypt the site visitors of their customers. These apps have over 380 million mixed downloads in Google Play.

All three corporations, which had been beforehand discovered to have ties with Qihoo 360, a Chinese language cybersecurity agency that the US sanctioned in 2020, present utility layer VPN providers and depend on the Shadowsocks protocol, which was designed to bypass the Nice Firewall of China.

The protocol makes use of symmetric encryption and is prone to varied assaults, because of using deprecated ciphers and hardcoded passwords. Moreover, its interplay with the working system’s connection monitoring framework permits an attacker to take over connections.

The eight apps, specifically Turbo VPN, Turbo VPN Lite, VPN Monster, VPN Proxy Grasp, VPN Proxy Grasp – Lite, Snap VPN, Robotic VPN, and SuperNet VPN, help the IPsec and Shadowsocks protocols, present important code overlaps, and implement mechanisms to deceive evaluation and automatic safety checks.

All functions had been discovered prone to connection interference and packet injection assaults, all acquire consumer location info, use weak encryption, and comprise a hardcoded password for Shadowsocks configuration.Commercial. Scroll to proceed studying.

Utilizing the hardcoded password, Citizen Lab found that the three VPN suppliers providing these functions share the identical infrastructure, additional tightening the hyperlink between them.

One other group of suppliers, specifically Matrix Cellular PTE LTD, ForeRaya Know-how Restricted, Wildlook Tech PTE LTD, Hong Kong Silence Know-how Restricted, and Yolo Cellular Know-how Restricted, might be linked by their use of the identical protocols, code similarities, and obfuscation.

Their VPN purchasers, which have greater than 380 million mixed downloads, had been discovered prone to connection inference assaults, comprise obfuscated passwords, and connect with the identical set of IP addresses.

Two different suppliers, Quick Potato Pte. Ltd and Free Linked Restricted, supply VPN purchasers that depend on the identical proprietary protocol implementation.

Citizen Lab additionally analyzed three functions from VPN Tremendous Inc., Miczon LLC, and Safe Sign Inc., which seem to don’t have any hyperlinks to different VPNs, and which don’t use obfuscation past ProGuard.

In keeping with Citizen Lab, the safety and privateness points recognized throughout the analyzed functions have various influence on customers, such because the violation of belief and privateness by undisclosed location assortment, and the publicity to site visitors interception and tampering.

“The problems we recognized have an effect on customers, suppliers, and app shops. At a minimal, VPN customers who worth privateness ought to keep away from utilizing Shadowsocks, together with the apps from these builders, as Shadowsocks was not designed to facilitate privateness, merely censorship circumvention,” Citizen Lab notes.

Associated: Internet Internet hosting Companies in Taiwan Attacked by Chinese language APT for Entry to Excessive-Worth Targets

Associated: 300 Malicious ‘Vapor’ Apps Hosted on Google Play Had 60 Million Downloads

Associated: PCI DSS 4.0.1: A Cybersecurity Blueprint by the Business, for the Business

Associated: How Site visitors, State, and Organizational Knowledge Assist Fortify Your Community

Security Week News Tags:Apps, Deficiencies, Highlights, Links, Research, Security, VPN

Post navigation

Previous Post: PipeMagic Malware Mimic as ChatGPT App Exploits Windows Vulnerability to Deploy Ransomware
Next Post: New ClickFix Attack Uses Fake BBC News Page and Fraudulent Cloudflare Verification to Trick Users

Related Posts

Windows’ Infamous ‘Blue Screen of Death’ Will Soon Turn Black Security Week News
In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer Security Week News
Ingram Micro Restores Systems Impacted by Ransomware Security Week News
Promptfoo Raises $18.4 Million for AI Security Platform Security Week News
Cybersecurity M&A Roundup: 41 Deals Announced in June 2025 Security Week News
Proofpoint to Acquire Hornetsecurity in Reported $1 Billion Deal Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms
  • High-Severity Vulnerabilities Patched in Chrome, Firefox
  • Intel Employee Data Exposed by Vulnerabilities
  • Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code
  • New Salty 2FA PhaaS platform Attacking Microsoft 365 Users to Steal Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms
  • High-Severity Vulnerabilities Patched in Chrome, Firefox
  • Intel Employee Data Exposed by Vulnerabilities
  • Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code
  • New Salty 2FA PhaaS platform Attacking Microsoft 365 Users to Steal Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News