Thursday, January 30, 2025
HomeAndroidHidden Malware and Privacy Risks with the Top Free Android VPN apps...

Hidden Malware and Privacy Risks with the Top Free Android VPN apps in the Google Play Store

Published on

SIEM as a Service

Follow Us on Google News

Many of the VPN apps in the google play store failed to protect the user privacy, potentially malicious and spy on users secure transactions.

According to Simon Migliano Head of Research, over 25% of apps failed to protect the user privacy and 85% apps contains suspicious permissoopns that spy on users.

Top10VPN’s extensive research published rist index findings to avoid customers using flawed apps that compromise the user privacy and security.

Risk Index tested over 150 Free Android VPN apps that has more than 260M installs for effective encryption, browser leaks, viruses and malware, dangerous app functions, behaviors and suspicious permissions.

66% of apps asking users to grant intrusive permissions, 25% ask users to give tracking permissions and 38% of apps asking permission to access personal info.

The permissions includes accessing user’s camera, recoding through Microphone without user consent, accessing contacts and sending SMS secretly.

According to the team analysis report, 63% of all apps abuses users privacy, 18% of apps reported positives of malware scan and 38% apps has major abnormality.The detailed report states that all the VPN indexed by Risk Index were encryption the traffic.

A number of intrusive permissions were detected in 150 apps that indexed the write external storage, Bluetooth, read contacts, camera, send sms, record audio, read calendar anad activity recognization.

Free Android VPN apps

VPN is basically a private network through which you can connect to the Internet. It makes your web traffic pass through encrypted connections to servers which are under the control of providers.

One of the most important reasons to install your own VPN is to be sure that your provider is not selling your browsing history to others. This is permissible under law and you cannot be sure of the integrity of all providers.

Alex Brammer told Gbhackers that, we identified the top 150 free VPN apps on the Google Play store and downloaded the binaries for analysis. The binaries were scanned using the VirusTotal tool, the resulting reports for each app identified the following: matches against major databases for known malware and viruses; app permissions; and dangerous functions and behavior.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

10,000 WordPress Websites Hacked to Distributing MacOS and Microsoft Malware

Over 10,000 WordPress websites have been hijacked to deliver malicious software targeting both macOS...

New RDP Exploit Allows Attackers to Take Over Windows and Browser Sessions

Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol...

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

10,000 WordPress Websites Hacked to Distributing MacOS and Microsoft Malware

Over 10,000 WordPress websites have been hijacked to deliver malicious software targeting both macOS...

New RDP Exploit Allows Attackers to Take Over Windows and Browser Sessions

Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol...

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...