sfx2000
Part of the Furniture
Interesting read from HelpNetSecurity
https://www.helpnetsecurity.com/2017/01/26/trust-android-vpn-client/
https://www.helpnetsecurity.com/2017/01/26/trust-android-vpn-client/
A group of researchers has analyzed 283 Android apps from Google Play that use the Android VPN permission in search of possible malware presence, third-party library embedding, and traffic manipulation, and have discovered that:
- 18% of the apps implement tunneling protocols without encryption (despite promising online anonymity and security to users)
- 84% of the apps don’t tunnel IPv6 traffic, and 66% don’t tunnel DNS traffic for a variety of reasons, thus exposing users to online tracking by surveillance agencies or commercial WiFi access points
- 75% of the apps use third-party tracking libraries and 82% request permissions to access sensitive resources (e.g. user accounts, text messages)
- VirusTotal identified malware presence in 38% of the analyzed apps
- 18% of the apps do not mention the entity hosting the terminating VPN server
- 16% of the apps may forward traffic through other participating users rather than use servers hosted in the cloud (and this raises a number of trust, security, and privacy concerns for participating users)
- 16% of the apps deploy non-transparent proxies that modify user’s HTTP traffic. In fact, two of them actively inject JavaScript code into the user’s traffic for advertisement and tracking purposes, and one of them redirects e-commerce traffic to external advertising partners.
- Four of the analyzed VPN apps compromise users’ root-store and actively perform TLS interception, ostensibly in order to optimize traffic to certain services.