Saturday, May 18, 2024

Android Device Leaks Traffic When Connected to WiFi Network Even ‘Always-on VPN’ is Enabled

The installation of a VPN on your Android phone is supposed to ensure that all outgoing traffic is protected. This is what in the name of privacy the VPN providers claim at least.

It was discovered by Mullvad VPN during an ongoing security audit that every time an Android device connects to a WiFi network, it leaks traffic. While the most shocking thing is that this leak happens after enabling the following security features as well:-

  • Always-on VPN
  • Block connections without a VPN

Data leak

A connection check is sent outside the VPN tunnel by the Android operating system and outside VPN tunnels, the following types of data are being leaked:- 

  • Source IP addresses
  • DNS lookups
  • HTTPS traffic
  • NTP traffic

In Android’s documentation, the “VPN Lockdown” feature of Android appears to be described in an inaccurate manner, which means that Android users probably did not know this until now.

Therefore, Mullvad has issued a warning with the aim of bringing awareness to this issue. Furthermore, it also increases the pressure on Google as a result of such a measure.

Since this can present a privacy concern for some users depending on their threat model in some cases.

Privacy issue

VPNs mainly provide a protected network connection to the users that encrypts internet traffic over public networks in order to increase the privacy of users.

In order to provide a seamless experience, your VPN service will use the same IP address for all your Internet connections. As this will be used instead of your public IP address when connected to a VPN service.

With this program, users can bypass internet censorship and browse the web anonymously without any worry of being tracked.

In Android, you have the option of blocking network connections through Android’s “Network & Internet” setting, if you are not using a VPN to access the web.

With the help of this feature, the user’s IP address will not be accidentally leaked, if the VPN connection is interrupted or broken unexpectedly.

However, this feature is devalued by the requirements to acclimate special cases, such as the identification of captive portals, which undercut this feature.

In addition to the party controlling the connectivity check server, any entity that observes the traffic on the network will be able to observe and analyze the traffic on the connection check server.

As far as the leaks are concerned, there is nothing that can be done within the app to fix them. What experts can now do is inform users about the limitations of Android OS and remain transparent about the existence of these issues.

Block more Intense DDoS Attacks , Always Enable Multi-layered Protection.


Latest articles

Norway Recommends Replacing SSLVPN/WebVPN to Stop Cyber Attacks

A very important message from the Norwegian National Cyber Security Centre (NCSC) says that...

New Linux Backdoor Attacking Linux Users Via Installation Packages

Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices,...

ViperSoftX Malware Uses Deep Learning Model To Execute Commands

ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine,...

Santander Data Breach: Hackers Accessed Company Database

Santander has confirmed that there was a major data breach that affected its workers...

U.S. Govt Announces Rewards up to $5 Million for North Korean IT Workers

The U.S. government has offered a prize of up to $5 million for information...

Russian APT Hackers Attacking Critical Infrastructure

Russia leverages a mix of state-backed Advanced Persistent Threat (APT) groups and financially motivated...

Millions Of IoT Devices Vulnerable To Attacks Leads To Full Takeover

Researchers discovered four significant vulnerabilities in the ThroughTek Kalay Platform, which powers 100 million...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles