Skip to content

From VPN to Spyware: The FreeVPN.One Chronicles

Blog
6 3 1.1k 1
  • From VPN to Spyware: The FreeVPN.One Chronicles

    The Turning Point

    FreeVPN.One began its life as a popular Chrome VPN extension. With over 100,000 installs and even a verified badge on the Chrome Web Store, it seemed legitimate. Privacy-conscious users trusted it for secure browsing—until now. Recent research has revealed a disturbing transformation: what was once a tool cloaked in privacy is now an invasive surveillance tool.

    The Spyware Mechanism

    A forensic investigation by Koi Security uncovered a chilling reality: the extension automatically takes full-page screenshots of every website a user visits. This includes sensitive content like personal messages, banking dashboards, and private photos. Here’s how it works:

    • Utilizing Chrome’s chrome.tabs.captureVisibleTab() API, the extension silently snaps screenshots behind the scenes.
    • Screenshots are bundled with metadata—like URLs, tab IDs, and unique user identifiers—and exfiltrated to a remote server aitd.one/brange.php without your consent or awareness.

    Timeline of the Betrayal

    Koi Security outlined a telling progression:

    Date Version Behavior
    April 2025 v3.0.3 Requests new permissions; no spying yet
    June 2025 v3.1.1 AI Threat Detection” branding; broader web access
    17 July 2025 v3.1.3 Spyware becomes active: screenshots, location tracking, device fingerprinting begin
    25 July 2025 v3.1.4 Exfiltration encrypted (uses AES-256‑GCM with RSA key wrapping) to evade detection tools

    Developer’s Excuses—and the Harsh Reality

    The extension’s developer has tried to play it off as a “security scan”, claiming screenshots are only taken as part of this process. According to them, data isn’t stored but merely analyzed by AI. However:

    • The screenshots encompass all sites—even innocuous ones like Google Sheets and banking portals.
    • The UI’s “AI Threat Detection” button is essentially a decoy, as screenshotting begins automatically, long before any user interaction.
    • Investigators found no legitimate company information tied to the publisher: the email leads to a bare Wix page with no corporate identity or transparency.
    • Communication from the developer stopped entirely after initial outreach.

    What Users Need to Know Now

    1. Act Immediately
      If you’ve used this extension:

      • Remove it from your browser immediately.
      • Change passwords for any sites accessed while the extension was active.
    2. Avoid Free VPN Extensions That Lack Transparency
      This case is, unfortunately, not unique. Many free VPNs use your data as a revenue source, selling logs or loading tracking scripts—even when they claim to protect your privacy.

    3. Prioritize Audited and Trusted Services
      Use VPNs with:

      • Strong privacy policies (e.g., audited ‘no‑logs’ claims).
      • Clear, reputable ownership and transparency.
      • Regular security audits.
    4. Be Cautious with Browser Extensions
      Even non‑VPN extensions can become attack vectors. Spy‑ware hidden in innocent‑looking add-ons is all too real.

    Final Thoughts

    FreeVPN.One turned from a convenient privacy tool into a dangerous spy tool in just a few months. This serves as a stark reminder: in the tech world, trust is hard-earned—but easily broken.

    • Free doesn’t always mean benign. When you don’t pay, sometimes you are the product.
    • Regularly audit your extensions. If something requests broad permissions or comes out of nowhere, it might not be worth the risk.
    • Invest in transparency. Opt for tools backed by reputable companies, audited code, and clear policies.

    Sources

    https://spyboy.blog/2025/02/25/the-hidden-dangers-of-free-vpns-why-free-often-comes-at-a-high-cost

  • From VPN to Spyware: The FreeVPN.One Chronicles

    The Turning Point

    FreeVPN.One began its life as a popular Chrome VPN extension. With over 100,000 installs and even a verified badge on the Chrome Web Store, it seemed legitimate. Privacy-conscious users trusted it for secure browsing—until now. Recent research has revealed a disturbing transformation: what was once a tool cloaked in privacy is now an invasive surveillance tool.

    The Spyware Mechanism

    A forensic investigation by Koi Security uncovered a chilling reality: the extension automatically takes full-page screenshots of every website a user visits. This includes sensitive content like personal messages, banking dashboards, and private photos. Here’s how it works:

    • Utilizing Chrome’s chrome.tabs.captureVisibleTab() API, the extension silently snaps screenshots behind the scenes.
    • Screenshots are bundled with metadata—like URLs, tab IDs, and unique user identifiers—and exfiltrated to a remote server aitd.one/brange.php without your consent or awareness.

    Timeline of the Betrayal

    Koi Security outlined a telling progression:

    Date Version Behavior
    April 2025 v3.0.3 Requests new permissions; no spying yet
    June 2025 v3.1.1 AI Threat Detection” branding; broader web access
    17 July 2025 v3.1.3 Spyware becomes active: screenshots, location tracking, device fingerprinting begin
    25 July 2025 v3.1.4 Exfiltration encrypted (uses AES-256‑GCM with RSA key wrapping) to evade detection tools

    Developer’s Excuses—and the Harsh Reality

    The extension’s developer has tried to play it off as a “security scan”, claiming screenshots are only taken as part of this process. According to them, data isn’t stored but merely analyzed by AI. However:

    • The screenshots encompass all sites—even innocuous ones like Google Sheets and banking portals.
    • The UI’s “AI Threat Detection” button is essentially a decoy, as screenshotting begins automatically, long before any user interaction.
    • Investigators found no legitimate company information tied to the publisher: the email leads to a bare Wix page with no corporate identity or transparency.
    • Communication from the developer stopped entirely after initial outreach.

    What Users Need to Know Now

    1. Act Immediately
      If you’ve used this extension:

      • Remove it from your browser immediately.
      • Change passwords for any sites accessed while the extension was active.
    2. Avoid Free VPN Extensions That Lack Transparency
      This case is, unfortunately, not unique. Many free VPNs use your data as a revenue source, selling logs or loading tracking scripts—even when they claim to protect your privacy.

    3. Prioritize Audited and Trusted Services
      Use VPNs with:

      • Strong privacy policies (e.g., audited ‘no‑logs’ claims).
      • Clear, reputable ownership and transparency.
      • Regular security audits.
    4. Be Cautious with Browser Extensions
      Even non‑VPN extensions can become attack vectors. Spy‑ware hidden in innocent‑looking add-ons is all too real.

    Final Thoughts

    FreeVPN.One turned from a convenient privacy tool into a dangerous spy tool in just a few months. This serves as a stark reminder: in the tech world, trust is hard-earned—but easily broken.

    • Free doesn’t always mean benign. When you don’t pay, sometimes you are the product.
    • Regularly audit your extensions. If something requests broad permissions or comes out of nowhere, it might not be worth the risk.
    • Invest in transparency. Opt for tools backed by reputable companies, audited code, and clear policies.

    Sources

    https://spyboy.blog/2025/02/25/the-hidden-dangers-of-free-vpns-why-free-often-comes-at-a-high-cost

    @phenomlab I have never used this, but this is excellent info and won’t even be looking at it. Thanks for this!

  • @phenomlab I have never used this, but this is excellent info and won’t even be looking at it. Thanks for this!

    @Madchatthew No problems.

  • With rare exceptions, if it’s free, either you’re the product or it’s no good 🙂

  • With rare exceptions, if it’s free, either you’re the product or it’s no good 🙂

    @DownPW in this case, you’d definitely be the product!

  • With rare exceptions, if it’s free, either you’re the product or it’s no good 🙂

    @DownPW said in From VPN to Spyware: The FreeVPN.One Chronicles:

    With rare exceptions, if it’s free, either you’re the product or it’s no good 🙂

    Yeah, you got that right!


Related Topics
  • Why Forums Are Still Relevant in 2024

    Blog forums privacy
    3
    2 Votes
    3 Posts
    976 Views
    @JAC wow. Thanks for the great comments. They are truly appreciated. I tend to agree with the social media comments you’ve made. This is made all the more prominent in relation to recent events in Southport for example, and toxicity is a huge issue. Just look at some of the comments from trolls - they are truly disgusting, and the perpetrators seem to take great delight in the anonymity the Internet affords them. forums in general are much more subject focused, easier to moderate and users are less likely to be banned because they are there for a specific interest or reason, not to cause trouble. Agreed, although discussions can still get out of hand and quite often, these are left to run riot and quickly spiral out of control. A great example of that is here https://sudonix.org/topic/141/how-to-destroy-a-community-before-it-s-even-built there’s something much more calming about coming to a specific page at your fancy, posting and taking part in healthy debates over the real mishmash of social media. Yes, I personally prefer the atmosphere of a forum against the backdrop of unwanted noise via social media.
  • 0 Votes
    2 Posts
    2k Views
    See enclosed article from Sky News https://news.sky.com/story/worlds-largest-botnet-taken-down-as-alleged-chinese-mastermind-arrested-and-29m-in-cryptocurrency-seized-13145394
  • Recall to take screenshots every 2 seconds

    Blog spying copilot microsoft
    14
    9 Votes
    14 Posts
    2k Views
    Updated, but still a privacy nightmare https://www.bbc.com/news/articles/cj3xjrj7v78o
  • Apple, what were you thinking?

    Blog apple history crushed
    15
    14 Votes
    15 Posts
    3k Views
    My daughter needed a new tablet, which was an older Samsung. My wife wanted to get her an Ipad. Fortunately, I was able to talk her out of that and show her how much better an android tablet would be. Preferably the Samsung S9 Ultra tablet. By the way, that thing is outstanding! Great purchase!
  • Goodbye OnePlus, hello Samsung

    Blog oneplus performance
    73
    36 Votes
    73 Posts
    11k Views
    @phenomlab yeah and that makes sense. I wish I would have noticed it before i wiped the old phone and packaged it up to send back. Then I could have tried a different method for transferring the data. Oh well, ya live and ya learn I guess
  • Linux vs Windows - who wins ?

    Blog windows linux
    8
    4 Votes
    8 Posts
    2k Views
    @phenomlab LOL ah yes, I remember all of that. The good ole days!
  • 208 Votes
    371 Posts
    113k Views
    @Madchatthew yeah, I’ve seen these posts all over LinkedIn
  • Hit with Malware?

    Malware malware vulnerability ransomware
    1
    0 Votes
    1 Posts
    668 Views
    No one has replied