In the ever-evolving landscape of digital privacy, Virtual Private Networks (VPNs) have emerged as essential tools for users seeking security, anonymity, and unrestricted access to content. However, a recent investigation has cast a shadow over the integrity of many VPN services available today, revealing that not all VPNs are created equal.
Security Flaws and Hidden Ownership
A comprehensive report titled Hidden Links: Analyzing Secret Families of VPN Apps, produced by researchers at the University of Toronto’s Citizen Lab and Arizona State University, highlights significant vulnerabilities in several Android VPN applications found on the Google Play Store. The findings indicate that these apps may not only compromise user data but also mislead consumers regarding their ownership.
“The providers appear to be owned and operated by a Chinese company and have gone to great lengths to hide this fact from their 700+ million combined user bases.”
The researchers scrutinized the 100 most-downloaded VPNs, focusing on those not based in the United States. By analyzing websites, business filings, and the source code of the VPN applications, they identified connections between various providers, categorizing them into three distinct families based on shared technical infrastructures and security flaws.
- Family A: This group includes eight VPN applications linked to providers such as Innovative Connecting, Autumn Breeze, and Lemon Clove. A notable security flaw was identified—a hard-coded key used for creating passwords for Shadowsocks, a tool designed to bypass the Chinese government’s censorship. This vulnerability allows potential eavesdroppers to decrypt communications transmitted through these apps.
“On many of the VPNs we analyzed, a network eavesdropper between the VPN client and VPN server can use the hard-coded Shadowsocks password to decrypt all communications for all clients using the apps.”
- Family B: Comprising six providers responsible for apps like Global VPN, XY VPN, and Super Z VPN, this family also exhibited hard-coded passwords for Shadowsocks. The researchers caution against using apps that depend on Shadowsocks for anonymity, as it was not designed for this purpose.
“It was counterintuitive to find deprecated ciphers and hard-coded passwords in these apps, given that they are security-sensitive apps and many of their providers are owned by Qihoo 360, a major Chinese cybersecurity firm.”
- Family C: This family includes providers of VPNs such as Fast Potato VPN and X-VPN, which also suffer from security vulnerabilities, including susceptibility to blind in/on-path attacks, allowing manipulation of traffic from devices using the app.
The researchers speculate that the motivation behind operating multiple VPNs while obscuring their ownership may stem from a desire to mitigate reputational risks associated with any single service. By sharing code among various apps, providers can also reduce costs, albeit at the potential expense of user security.
The implications of these findings are significant, particularly as users often trust VPNs to safeguard their online activities. The report raises critical questions about the responsibility of platforms like Google in vetting the security of applications available on their stores. The complexity of tracing relationships between app providers presents challenges for automated oversight, yet the financial resources of companies like Google suggest that more rigorous scrutiny could be feasible.
“Google is potentially exposing its brand to reputational damage by hosting and profiting from deceptive and insecure apps like the ones we investigated.”
As users navigate the digital realm, the importance of conducting thorough research on security products cannot be overstated. Opting for reputable companies with a proven track record is advisable, as the landscape of online privacy continues to evolve.