Sunday, November 24, 2024
HomeAndroidAndroid Device Leaks Traffic When Connected to WiFi Network Even 'Always-on VPN'...

Android Device Leaks Traffic When Connected to WiFi Network Even ‘Always-on VPN’ is Enabled

Published on

The installation of a VPN on your Android phone is supposed to ensure that all outgoing traffic is protected. This is what in the name of privacy the VPN providers claim at least.

It was discovered by Mullvad VPN during an ongoing security audit that every time an Android device connects to a WiFi network, it leaks traffic. While the most shocking thing is that this leak happens after enabling the following security features as well:-

  • Always-on VPN
  • Block connections without a VPN

Data leak

A connection check is sent outside the VPN tunnel by the Android operating system and outside VPN tunnels, the following types of data are being leaked:- 

- Advertisement - SIEM as a Service
  • Source IP addresses
  • DNS lookups
  • HTTPS traffic
  • NTP traffic

In Android’s documentation, the “VPN Lockdown” feature of Android appears to be described in an inaccurate manner, which means that Android users probably did not know this until now.

Therefore, Mullvad has issued a warning with the aim of bringing awareness to this issue. Furthermore, it also increases the pressure on Google as a result of such a measure.

Since this can present a privacy concern for some users depending on their threat model in some cases.

Privacy issue

VPNs mainly provide a protected network connection to the users that encrypts internet traffic over public networks in order to increase the privacy of users.

In order to provide a seamless experience, your VPN service will use the same IP address for all your Internet connections. As this will be used instead of your public IP address when connected to a VPN service.

With this program, users can bypass internet censorship and browse the web anonymously without any worry of being tracked.

In Android, you have the option of blocking network connections through Android’s “Network & Internet” setting, if you are not using a VPN to access the web.

With the help of this feature, the user’s IP address will not be accidentally leaked, if the VPN connection is interrupted or broken unexpectedly.

However, this feature is devalued by the requirements to acclimate special cases, such as the identification of captive portals, which undercut this feature.

In addition to the party controlling the connectivity check server, any entity that observes the traffic on the network will be able to observe and analyze the traffic on the connection check server.

As far as the leaks are concerned, there is nothing that can be done within the app to fix them. What experts can now do is inform users about the limitations of Android OS and remain transparent about the existence of these issues.

Block more Intense DDoS Attacks , Always Enable Multi-layered Protection.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as...

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Google Unveils New Intelligent, Real-Time Protections for Android Users

Google has once again raised the bar for mobile security by introducing two new...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

ToxicPanda Banking Malware Attacking Banking Users To Steal Logins

Recent research has uncovered a new strain of malware developed for Android devices, initially...