{"id":257067,"date":"2025-11-11T16:15:14","date_gmt":"2025-11-11T16:15:14","guid":{"rendered":"https:\/\/www.newsbeep.com\/uk\/257067\/"},"modified":"2025-11-11T16:15:14","modified_gmt":"2025-11-11T16:15:14","slug":"google-issues-critical-new-vpn-threat-warning-for-billions-of-users","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/uk\/257067\/","title":{"rendered":"Google Issues Critical New VPN Threat Warning For Billions Of Users"},"content":{"rendered":"<p><img decoding=\"async\" class=\" top-image\" src=\"https:\/\/www.newsbeep.com\/uk\/wp-content\/uploads\/2025\/11\/1762736050_351_960x0.jpg\" alt=\"vpn connecting word and Hacker icon in mobile phone with digital code numbers.\" data-height=\"2424\" data-width=\"3636\" fetchpriority=\"high\" style=\"position:absolute;top:0\"\/><\/p>\n<p>Google warns billions of smartphone users of VPN threat.<\/p>\n<p>getty<\/p>\n<p>Updated November 11 with additional details of how the use of  Virtual Private Networks can be abused in real-world attacks, alongside information on how VPNs work as well as the original warning from Google about malicious VPN activity, fake apps and scams. <\/p>\n<p>Google is on something of a security advisory blitz at the moment. From warnings that users must <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/07\/restart-google-chrome-142-now-high-rated-security-issues-confirmed\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/07\/restart-google-chrome-142-now-high-rated-security-issues-confirmed\/\" target=\"_self\" aria-label=\"restart their Chrome browser\" rel=\"nofollow noopener\">restart their Chrome browser<\/a> following confirmation of a bunch of high-severity vulnerabilities, and another aimed at iPhone users after research suggested <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/10\/30\/new-research-claims-iphone-less-safe-than-google-android-phones\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/10\/30\/new-research-claims-iphone-less-safe-than-google-android-phones\/\" target=\"_self\" aria-label=\"Android devices are safer\" rel=\"nofollow noopener\">Android devices are safer<\/a>. However, one of the most critical, in the light of the current political and technical climate, doesn\u2019t concern <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/08\/samsung-spyware-attack---critical-landfall-0-day-used-whatsapp-images\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/08\/samsung-spyware-attack---critical-landfall-0-day-used-whatsapp-images\/\" target=\"_self\" aria-label=\"hackers exploiting Android vulnerabilities\" rel=\"nofollow noopener\">hackers exploiting Android vulnerabilities<\/a> or threats actors employing <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/08\/samsung-spyware-attack---critical-landfall-0-day-used-whatsapp-images\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/08\/samsung-spyware-attack---critical-landfall-0-day-used-whatsapp-images\/\" target=\"_self\" aria-label=\"dangerous calendar invites\" rel=\"nofollow noopener\">dangerous calendar invites<\/a> in attacks, but rather the use of a VPN. Here\u2019s what all smartphone users need to know and do. <\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-1\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/07\/google-issues-new-gmail-messages-and-play-attacks-warning\/\" target=\"_blank\" aria-label=\"Google Issues New Gmail, Messages And Play Attacks Warning\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/07\/google-issues-new-gmail-messages-and-play-attacks-warning\/\" rel=\"nofollow noopener\">ForbesGoogle Issues New Gmail, Messages And Play Attacks WarningBy Davey Winder<\/a>These VPNs Deliver Dangerous Malware Payloads, Including Password-Stealers, Google Warns<\/p>\n<p>As I recently reported, Laurie Richardson, Google\u2019s vice president of trust and safety, has confirmed a number of security warnings for all smartphone users with the publication of its <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/07\/google-issues-new-gmail-messages-and-play-attacks-warning\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/07\/google-issues-new-gmail-messages-and-play-attacks-warning\/\" target=\"_self\" aria-label=\"latest advisory\" rel=\"nofollow noopener\">latest advisory<\/a>. <\/p>\n<p>To be honest, the timing really couldn\u2019t have been better. And I\u2019m not referring to the fact that the advisory included seasonal shopping scams to beware of, but rather that the uptick in the <a class=\"color-link\" href=\"https:\/\/www.bbc.co.uk\/news\/articles\/cn72ydj70g5o\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.bbc.co.uk\/news\/articles\/cn72ydj70g5o\" aria-label=\"use of virtual private networks\">use of virtual private networks<\/a> following the implementation of the Online Safety Act in the U.K., and state-based legislation in the U.S., effectively makes accessing online pornography harder. Faced with stiff age-validation obstacles, many users have turned to a VPN to get them past the porn barriers, which is where the Google warning comes into play. <\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-5\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/10\/hotels-hacker-alert-issued-as-i-paid-twice-attacks-confirmed\/\" target=\"_blank\" aria-label=\"Hotels Hacker Alert Issued As \u2018I Paid Twice\u2019 Attacks Confirmed\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/10\/hotels-hacker-alert-issued-as-i-paid-twice-attacks-confirmed\/\" rel=\"nofollow noopener\">ForbesHotels Hacker Alert Issued As \u2018I Paid Twice\u2019 Attacks ConfirmedBy Davey Winder<\/a><\/p>\n<p>Threat actors are, Richardson warned, disseminating \u201cmalicious applications disguised as legitimate VPN services across a wide range of platforms to compromise user security and privacy.\u201d While enterprise users are not exempt from such deception, consumer VPN brands and consumers themselves, especially those who like to consume porn, are likely an easier target. Especially, as Google has pointed out, the threat actors will deploy social engineering campaigns that use \u201csexually suggestive advertising.\u201d<\/p>\n<p>Install a malicious VPN app, a fake VPN service, and far from protecting your privacy, you leave yourself open to a myriad of malware and privacy threats. Sure, they might actually work and get you that access, generally very slow access indeed as they will piggy-back off of legitimate free VPN platforms, to the porn you are after, but at the same time deliver password-stealing malware and remote access trojans. These serve to \u201cexfiltrate sensitive data such as browsing history, private messages, financial credentials and cryptocurrency wallet information,\u201d Richardson confirmed. <\/p>\n<p>I would advise readers to keep an eye on <a class=\"color-link\" href=\"https:\/\/blog.google\/technology\/safety-security\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/blog.google\/technology\/safety-security\/\" aria-label=\"the advisories\">the advisories<\/a> that are issued by the Google safety and security team, as they almost always contain a lot of common security sense.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-6\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/09\/gemini-ai-can-read-your-gmail-now-google-says---meh\/\" target=\"_blank\" aria-label=\"Gemini AI Can Read Your Gmail Now, Google Says \u2014 Meh!\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/09\/gemini-ai-can-read-your-gmail-now-google-says---meh\/\" rel=\"nofollow noopener\">ForbesGemini AI Can Read Your Gmail Now, Google Says \u2014 Meh!By Davey Winder<\/a>What Is A VPN And How Does It Work?<\/p>\n<p>A consumer VPN is, put simply, an app that uses a platform that brings an encrypted tunnel to the connection party between your device and the site or service you are using on the internet. This VPN tunnel, according to the privacy experts at Proton, connects you first to the VPN server, which \u201chandles all DNS queries and acts as an intermediary that sits between your device and the internet, routing your data to the correct destinations.\u201c<\/p>\n<p>This is what hides your actual IP address from the internet service provider and the website or service you are connecting to, instead showing as that of the VPN server instead. You can select from a number of different VPN servers, depending upon the platform, with some offering many individual servers in many different cities or countries around the world. It\u2019s this ability to not only hide your IP address, but make it seem that you are connecting from a different location, that is used by VPN customers to bypass geo-location restrictions for services ranging from streaming sites to, yes, porn ones. <\/p>\n<p>\u201cThe most important thing to evaluate when choosing a VPN provider is whether it is trustworthy,\u201d <a class=\"color-link\" href=\"https:\/\/protonvpn.com\/what-is-a-vpn\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/protonvpn.com\/what-is-a-vpn\" aria-label=\"Proton said\">Proton said<\/a>, echoing the Google warning; \u201cThis is crucial, as your VPN provider handles your internet connection, meaning it can see the browsing history you\u2019re trying to keep private.\u201d<\/p>\n<p>Business VPN technology works in the same way, but is employed for a different purpose than most consumer applications. They offer encrypted network connections for data transit across untrusted networks, allowing an organization that has offices in multiple remote locations to gain authenticated access to corporate systems. <\/p>\n<p>The U.K. National Cyber Security Centre <a class=\"color-link\" href=\"https:\/\/www.ncsc.gov.uk\/collection\/device-security-guidance\/infrastructure\/virtual-private-networks\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.ncsc.gov.uk\/collection\/device-security-guidance\/infrastructure\/virtual-private-networks\" aria-label=\"recommends\">recommends<\/a> that organizations use native operating system clients where possible, stating that third-party VPN clients can increase the risk that \u201csome data may be sent outside the VPN,\u201d as well as increasing the risk that \u201csome out-of-date software will be in use,\u201d which is always a security concern. <\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-7\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/07\/iphone-users-warned---if-you-see-this-helpful-message-do-not-reply\/\" target=\"_blank\" aria-label=\"iPhone Users Warned \u2014 If You See This \u2018Helpful\u2019 Message, Do Not Reply\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/11\/07\/iphone-users-warned---if-you-see-this-helpful-message-do-not-reply\/\" rel=\"nofollow noopener\">ForbesiPhone Users Warned \u2014 If You See This \u2018Helpful\u2019 Message, Do Not ReplyBy Davey Winder<\/a>When Is A VPN Attack Not A VPN Attack?<\/p>\n<p>The answer to the question posed in the sub-heading above is, dear reader, when it\u2019s a phishing attack that exploits VPN usage in order to scam the intended victim. As <a class=\"color-link\" href=\"https:\/\/thehackernews.com\/2025\/11\/new-httptroy-backdoor-poses-as-vpn.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/thehackernews.com\/2025\/11\/new-httptroy-backdoor-poses-as-vpn.html\" aria-label=\"The Hacker News\">The Hacker News<\/a> recently reported, <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/01\/29\/new-fbi-warning-disable-local-admin-accounts-as-attacks-continue\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/01\/29\/new-fbi-warning-disable-local-admin-accounts-as-attacks-continue\/\" target=\"_self\" aria-label=\"North Korean threats actors\" rel=\"nofollow noopener\">North Korean threats actors<\/a> have been observed using a targeted spear-phishing attack to distribute backdoor malware using a fake VPN invoice as the lure. Although this particular attack appears to be a one-off in terms of the intended victim, it is unlikely to be the only one that leverages VPN usage in order to get the user to open a malicious document or click a malicious link.<\/p>\n<p>Here\u2019s Why The Google VPN Warning Actually Matters<\/p>\n<p>Of more concern to more people, of course, are the reports of real-world, potentially malicious VPN warnings. Take, for example, the Google Chrome VPN extension, with more than 1000,000 installs and a decent review rating, that was <a class=\"color-link\" href=\"https:\/\/www.infosecurity-magazine.com\/news\/chrome-vpn-extension-spyware\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.infosecurity-magazine.com\/news\/chrome-vpn-extension-spyware\/\" aria-label=\"reported\">reported<\/a> as \u201cacting as spyware for five months,\u201d after an update earlier this year. Or how about the fake Android VPN and streaming app that <a class=\"color-link\" href=\"https:\/\/www.computing.co.uk\/news\/2025\/security\/fake-vpn-and-streaming-app-infects-thousands-of-android-devices-drains-bank-accounts\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.computing.co.uk\/news\/2025\/security\/fake-vpn-and-streaming-app-infects-thousands-of-android-devices-drains-bank-accounts\" aria-label=\"cybersecurity researchers discovered\">cybersecurity researchers discovered<\/a> was acting as a side loader for sophisticated banking trojan malware.<\/p>\n<p>Perhaps it should come as no great surprise that the biggest threat from malicious VPNs comes from those applications that are being offered free of charge. As the old saying goes, if the application is free, you\u2019re not the customer; you\u2019re the product. This isn\u2019t a 100% watertight observation, however, as the majority of free apps, not matter what they are for, are perfectly harmless and genuine. The flip side of the mantra being that some paid for applications can also be malicious, either by way of a change of ownership or following an update or developer account compromise, so a subscription fee is no guarantee of safety. All that aside, free VPNs don\u2019t exactly have the greatest of reputations for true privacy \u2014 including the servers where your data goes and who can see it. One investigation by a threat intelligence service found that a free VPN for PC users that was hosted on GitHub was actually a very <a class=\"color-link\" href=\"https:\/\/www.cyfirma.com\/research\/github-abused-to-spread-malware-disguised-as-free-vpn\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.cyfirma.com\/research\/github-abused-to-spread-malware-disguised-as-free-vpn\/\" aria-label=\"nasty malware campaign\">nasty malware campaign<\/a>. The VPN lure was designed to get the victim to fire up the software and actually execute a malware dropper by the name of launch.exe. The fake VPN campaign leveraged \u201cprocess injection, DLL side-loading, and stealthy execution techniques to implant <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/22\/microsoft-attacks-windows-password-hackers-in-global-counter-strike\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/22\/microsoft-attacks-windows-password-hackers-in-global-counter-strike\/\" target=\"_self\" aria-label=\"Lumma Stealer\" rel=\"nofollow noopener\">Lumma Stealer<\/a>, a notorious information-stealing malware.\u201d Notorious indeed, as I have warned readers of in <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/03\/01\/5000-captcha-tests-used-as-infostealer-gateways-do-not-complete-them\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/03\/01\/5000-captcha-tests-used-as-infostealer-gateways-do-not-complete-them\/\" target=\"_self\" aria-label=\"numerous reports\" rel=\"nofollow noopener\">numerous reports<\/a> concerning stolen passwords and <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/27\/94-billion-stolen-browser-tracking-cookies-published-to-dark-web\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/27\/94-billion-stolen-browser-tracking-cookies-published-to-dark-web\/\" target=\"_self\" aria-label=\"two-factor authentication session cookies\" rel=\"nofollow noopener\">two-factor authentication session cookies<\/a>. \u201cDisguised as a helpful tool, the dropper uses multiple layers of obfuscation, in-memory execution, and process injection to evade detection,\u201d the researchers said, warning of the malicious VPN application. <\/p>\n<p>Only Download VPNs From Official Sources, Google Warns<\/p>\n<p>Here\u2019s the thing, though, consumer VPNs are not some privacy and security silver bullet. To suggest otherwise is, frankly, disingenuous. VPNs will not make you entirely anonymous online, even when hiding your IP address, because browser fingerprinting and other factors will likely come into play for the average user. VPNs are not security tools, and while some offer phishing protection and the like, they cannot replace a dedicated multi-layered defensive security strategy. Most people, most of the time, do not need to use a VPN. There, I\u2019ve said it, and no doubt the VPN public reaction people will be emailing me within minutes. Sure, they have a use for getting around geo-location barriers, and, by implication, country-specific age restrictions, but the average user gains nothing from using one in a cafe or airport, as they are really not at risk from mythical Wi-Fi hackers in the first place. There, I\u2019ve said that as well. <\/p>\n<p>If you really must use a VPN, then follow the Google security advisory recommendations to \u201conly download VPN apps from official sources, and check for apps with the VPN badge in Google Play.\u201d Free offers and the sideloading of untrusted apps should, of course, be avoided. As should any VPN that requests permission to access contacts or private messages. As Cyberinsider quite rightly says, \u201cusing no VPN is better than using a bad VPN.\u201d Whether the issue is with slow as treacle connections, leaky IP addresses, no real privacy because of where the service or its servers are located, or, worst of all, malicious activity, being VPN aware is a good thing. There are plenty of resources online to help in getting VPN selection right for you, and to avoid many of the pitfalls, including those provided by <a class=\"color-link\" href=\"https:\/\/cyberinsider.com\/vpn\/test-check-vpn-working\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/cyberinsider.com\/vpn\/test-check-vpn-working\/\" aria-label=\"Cyberinsider\">Cyberinsider<\/a> itself. <\/p>\n","protected":false},"excerpt":{"rendered":"Google warns billions of smartphone users of VPN threat. getty Updated November 11 with additional details of how&hellip;\n","protected":false},"author":2,"featured_media":254016,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[105646,59,105649,105647,105645,86,56,54,55,17763,6114,105644,105642,105643,105648],"class_list":{"0":"post-257067","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-do-vpns-keep-you-secure","9":"tag-gb","10":"tag-google-security-advisory","11":"tag-google-vpn-warning","12":"tag-hacking-a-vpn","13":"tag-technology","14":"tag-uk","15":"tag-united-kingdom","16":"tag-unitedkingdom","17":"tag-virtual-private-network","18":"tag-vpn","19":"tag-vpn-hack","20":"tag-vpn-scam","21":"tag-vpn-security","22":"tag-why-you-shouldnt-use-a-vpn"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/posts\/257067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/comments?post=257067"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/posts\/257067\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/media\/254016"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/media?parent=257067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/categories?post=257067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/tags?post=257067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}