Thursday, December 26, 2024
HomeAndroidHidden Malware and Privacy Risks with the Top Free Android VPN apps...

Hidden Malware and Privacy Risks with the Top Free Android VPN apps in the Google Play Store

Published on

SIEM as a Service

Many of the VPN apps in the google play store failed to protect the user privacy, potentially malicious and spy on users secure transactions.

According to Simon Migliano Head of Research, over 25% of apps failed to protect the user privacy and 85% apps contains suspicious permissoopns that spy on users.

Top10VPN’s extensive research published rist index findings to avoid customers using flawed apps that compromise the user privacy and security.

- Advertisement - SIEM as a Service

Risk Index tested over 150 Free Android VPN apps that has more than 260M installs for effective encryption, browser leaks, viruses and malware, dangerous app functions, behaviors and suspicious permissions.

66% of apps asking users to grant intrusive permissions, 25% ask users to give tracking permissions and 38% of apps asking permission to access personal info.

The permissions includes accessing user’s camera, recoding through Microphone without user consent, accessing contacts and sending SMS secretly.

According to the team analysis report, 63% of all apps abuses users privacy, 18% of apps reported positives of malware scan and 38% apps has major abnormality.The detailed report states that all the VPN indexed by Risk Index were encryption the traffic.

A number of intrusive permissions were detected in 150 apps that indexed the write external storage, Bluetooth, read contacts, camera, send sms, record audio, read calendar anad activity recognization.

Free Android VPN apps

VPN is basically a private network through which you can connect to the Internet. It makes your web traffic pass through encrypted connections to servers which are under the control of providers.

One of the most important reasons to install your own VPN is to be sure that your provider is not selling your browsing history to others. This is permissible under law and you cannot be sure of the integrity of all providers.

Alex Brammer told Gbhackers that, we identified the top 150 free VPN apps on the Google Play store and downloaded the binaries for analysis. The binaries were scanned using the VirusTotal tool, the resulting reports for each app identified the following: matches against major databases for known malware and viruses; app permissions; and dangerous functions and behavior.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Indonesia Government Data Breach – Hackers Leaked 82 GB of Sensitive Data Online

Hackers have reportedly infiltrated and extracted a vast 82 GB of sensitive data from...

IBM AIX TCP/IP Vulnerability Lets Attackers Exploit to Launch Denial of Service Attack

IBM has issued a security bulletin warning of two vulnerabilities in its AIX operating...

Apache Auth-Bypass Vulnerability Lets Attackers Gain Control Over HugeGraph-Server

The Apache Software Foundation has issued a security alert regarding a critical vulnerability...

USA Launched Cyber Attack on Chinese Technology Firms

The Chinese National Internet Emergency Center (CNIE) has revealed two significant cases of cyber...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Indonesia Government Data Breach – Hackers Leaked 82 GB of Sensitive Data Online

Hackers have reportedly infiltrated and extracted a vast 82 GB of sensitive data from...

IBM AIX TCP/IP Vulnerability Lets Attackers Exploit to Launch Denial of Service Attack

IBM has issued a security bulletin warning of two vulnerabilities in its AIX operating...

Apache Auth-Bypass Vulnerability Lets Attackers Gain Control Over HugeGraph-Server

The Apache Software Foundation has issued a security alert regarding a critical vulnerability...