Smartphone

New research released this week reveals that a large chunk of today Android VPN clients are a serious security and privacy risk, with some clients failing to encrypt traffic, and some even injecting ads in a customer's browsing experience.

The study analyzed 283 VPN apps from over 1.4 million Android apps hosted on the Google Play Store.

Researchers focused their efforts on those apps that requested access to BIND_VPN_SERVICE, the Android permission that grants apps access to a series of built-in Android VPN-specific functions.

Wiz

After analyzing the internal structure of these apps and their behavior, researchers found a series of troubling issues that led them to conclude that a significant chunk of the Android VPN apps ecosystem doesn't protect its users enough.

Below is a summary of all the study's findings:

  • 38% of analyzed  VPN clients contain some malware presence according to VirusTotal.
  • 75% of them use third-party tracking libraries.
  • 82% request permissions to access sensitive resources including user accounts and text messages.
  • 18% of the apps do not mention the entity hosting the terminating VPN server.
  • 16% of the analyzed apps may forward traffic through other participating users rather than use servers hosted in the cloud.
  • 4% of the analyzed VPN apps use the VPN permission to implement localhost proxies to intercept and inspect user traffic locally (primarily for antivirus and traffic filtering purposes).
  • 18% of VPN apps don't encrypt traffic.
  • 84% don't tunnel IPv6 traffic.
  • 66% don't tunnel DNS traffic, exposing a user's browsing habits, mainly due to misconfigurations or developer-induced errors.
  • 16% of VPN apps deploy non-transparent proxies that modify user’s HTTP traffic by injecting and removing headers or performing techniques such as image transcoding.
  • 2 VPN apps actively injected JavaScript code in user’s traffic for advertisement and tracking purpose.
  • 1 VPN app redirected e-commerce traffic to an external advertising partner.
  • 4 VPN clients compromised the device's root-store by adding their own root certificates so they could intercept TLS encrypted traffic.
  • 3 VPN apps claimed to provide traffic acceleration services, but they selectively intercepted traffic to specific online services like social networks, banking, e-commerce sites, email and IM services.

Below is a table of the biggest offenders, according to the research crew, and a table of the worst offenders, based on user reviews.

VPN table

VPN table

"Despite the fact that Android VPN-enabled apps are being installed by millions of mobile users worldwide, their operational transparency and their possible impact on user’s privacy and security remains 'terra incognita' even for tech-savvy users," the research team concludes.

"The ability of the BIND_VPN_SERVICE permission to break  Android's sandboxing and the naive perception that most users have about third-party VPN apps suggest that it is urging to re-consider Android’s VPN permission model to increase the control over VPN clients," the researchers added.

Their full research, titled "An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps" is available for download from here.

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.

Related Articles:

Increase privacy on all your devices for just $67 with Surfshark VPN

New password spraying attacks target Cisco, PAN VPN gateways

Cellik Android malware builds malicious versions from Google Play apps

Ongoing SoundCloud issue blocks VPN users with 403 server error

New DroidLock malware locks Android devices and demands a ransom