Tuesday, March 19, 2024

Hidden Malware and Privacy Risks with the Top Free Android VPN apps in the Google Play Store

Many of the VPN apps in the google play store failed to protect the user privacy, potentially malicious and spy on users secure transactions.

According to Simon Migliano Head of Research, over 25% of apps failed to protect the user privacy and 85% apps contains suspicious permissoopns that spy on users.

Top10VPN’s extensive research published rist index findings to avoid customers using flawed apps that compromise the user privacy and security.

Risk Index tested over 150 Free Android VPN apps that has more than 260M installs for effective encryption, browser leaks, viruses and malware, dangerous app functions, behaviors and suspicious permissions.

66% of apps asking users to grant intrusive permissions, 25% ask users to give tracking permissions and 38% of apps asking permission to access personal info.

The permissions includes accessing user’s camera, recoding through Microphone without user consent, accessing contacts and sending SMS secretly.

According to the team analysis report, 63% of all apps abuses users privacy, 18% of apps reported positives of malware scan and 38% apps has major abnormality.The detailed report states that all the VPN indexed by Risk Index were encryption the traffic.

A number of intrusive permissions were detected in 150 apps that indexed the write external storage, Bluetooth, read contacts, camera, send sms, record audio, read calendar anad activity recognization.

Free Android VPN apps

VPN is basically a private network through which you can connect to the Internet. It makes your web traffic pass through encrypted connections to servers which are under the control of providers.

One of the most important reasons to install your own VPN is to be sure that your provider is not selling your browsing history to others. This is permissible under law and you cannot be sure of the integrity of all providers.

Alex Brammer told Gbhackers that, we identified the top 150 free VPN apps on the Google Play store and downloaded the binaries for analysis. The binaries were scanned using the VirusTotal tool, the resulting reports for each app identified the following: matches against major databases for known malware and viruses; app permissions; and dangerous functions and behavior.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Website

Latest articles

How ANY.RUN Malware Sandbox Process IOCs for Threat Intelligence Lookup?

The database includes indicators of compromise (IOCs) and relationships between different artifacts observed within...

CryptoWire Ransomware Attacking Abuses Schedule Task To maintain Persistence

AhnLab security researchers detected a resurgence of CryptoWire, a ransomware strain originally prevalent in...

E-Root Admin Sentenced to 42 Months in Prison for Selling 350,000 Credentials

Tampa, FL – In a significant crackdown on cybercrime, Sandu Boris Diaconu, a 31-year-old...

WhiteSnake Stealer Checks for Mutex & VM Function Before Execution

A new variant of the WhiteSnake Stealer, a formidable malware that has been updated...

Researchers Hack AI Assistants Using ASCII Art

Large language models (LLMs) are vulnerable to attacks, leveraging their inability to recognize prompts...

Microsoft Deprecate 1024-bit RSA Encryption Keys in Windows

Microsoft has announced an important update for Windows users worldwide in a continuous effort...

Beware Of Free wedding Invite WhatsApp Scam That Steal Sensitive Data

The ongoing "free wedding invite" scam is one of several innovative campaigns aimed at...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles