top of page

Securing Business Devices: Combatting Malicious VPN Apps with Mobile Security Solutions

  • Writer: Reef Noor
    Reef Noor
  • Mar 27, 2024
  • 2 min read

How Malicious VPN Apps Threaten Mobile Security in Business Environments


Numerous free VPN apps available on Google Play have been identified using a malicious software development kit (SDK) to transform Android devices into unsuspecting residential proxies, potentially facilitating cybercrime and shopping bots.



A picture of the Android logo in Neon colors.


Residential proxies reroute internet traffic through home-based devices, masking its origin and making it appear legitimate. While such proxies have legitimate uses like market research and ad verification, they are often exploited by cybercriminals for malicious purposes such as ad fraud, phishing, and credential stuffing.


Some users may willingly register for proxy services in exchange for rewards, but some providers employ unethical tactics to install proxying tools on users' devices without their consent. Victims of such installations risk having their internet bandwidth hijacked unknowingly, potentially leading to legal repercussions.


A recent report by HUMAN's Satori threat intelligence team identified 28 apps on Google Play secretly converting Android devices into proxy servers, including 17 disguised as free VPN software. These apps utilized a software development kit (SDK) by LumiApps containing "Proxylib," a Golang library enabling proxy functionality.



A screenshot of Lite VPN on Google Play Store


HUMAN suspects the malicious apps are associated with the Russian residential proxy service provider 'Asocks,' based on observed connections to the provider's website. Asocks is frequently promoted to cybercriminals on hacking forums.


These revelations highlight the importance of exercising caution when downloading apps and remaining vigilant against potential threats. Users should thoroughly research and verify apps before installation and report any suspicious activity to prevent further exploitation.



Key takeaways for your businesses:


  1. Evaluate App Security: Conduct thorough security assessments of all mobile apps used within the organization, including VPN apps. Pay close attention to the permissions and functionalities of these apps to identify any potential security risks.

  2. Implement Mobile Device Management (MDM): Implement MDM solutions to monitor and manage mobile devices used by employees. Use MDM tools to enforce security policies, restrict the installation of unauthorized apps, and detect and respond to security incidents.

  3. Educate Employees: Provide comprehensive training and awareness programs to educate employees about the risks associated with downloading and using free VPN apps. Encourage employees to only download apps from reputable sources and to report any suspicious activity immediately.

  4. Enforce App Whitelisting: Implement app whitelisting policies to restrict the installation of apps to approved, trusted sources. Maintain a list of approved VPN apps that have been vetted for security and reliability.

  5. Monitor Network Traffic: Implement network monitoring solutions to detect and block suspicious network traffic originating from mobile devices. Monitor for signs of proxying activities or connections to known malicious domains.

  6. Stay Updated on Threat Intelligence: Stay informed about emerging threats and vulnerabilities related to mobile app security. Subscribe to threat intelligence feeds and participate in industry forums to stay abreast of the latest developments in mobile security.

  7. Consider Enterprise-Grade VPN Solutions: Consider investing in enterprise-grade VPN solutions that offer robust security features and centralized management capabilities. These solutions provide greater control and visibility over VPN usage within the organization.


Protect your business from the risks posed by malicious VPN apps. Partner with Iron Reef to ensure the security of your mobile devices and data with our comprehensive mobile security solutions. Don't wait until it's too late – safeguard your business today!




bottom of page