Negating all VPNs may have been possible since 2002

Daniel Sims

Posts: 1,877   +49
Staff
In brief: Many users consider VPNs essential for maintaining digital privacy. However, researchers have discovered an exploit that can completely neutralize the technology without the target knowing, and every VPN on every operating system except Android is vulnerable. Furthermore, the only foolproof workaround is currently exclusive to Linux.

Researchers at the Leviathan Security Group have publicized an exploit that can force a VPN user to transmit unencrypted internet traffic outside of the VPN tunnel, exposing them to snooping and defeating the entire purpose of the technology. Currently, no method to fully address the problem exists on popular operating systems like Windows, macOS, or iOS. Although the researchers have found no evidence of active exploitation, it may have been possible for over two decades.

By running a DHCP server on the same network as their target, a malicious actor can route traffic meant for a VPN through a gateway and read it without encryption. The method is particularly sneaky because an affected user won't notice anything unusual.

The VPN channel remains undisturbed, so a device will still show that it is functioning properly, and kill switches never activate. Moreover, all encryption algorithms and VPN protocols are vulnerable since the exploit circumvents the entire system. The researchers tested WireGuard, OpenVPN, and IPsec.

However, the exploit's primary weakness is that it requires DHCP option 121. Because Android doesn't support option 121, attacks don't affect Android devices. Those using other operating systems can ignore 121, but the workaround risks disconnecting a device from the internet, and an attacker could deny access until option 121 is reenabled.

Using network namespaces also fixes the problem, but only Linux supports the function. The researchers suggest that Windows and Apple consider updating their operating systems to include the option.

Other mitigation methods like disabling DHCP, tightening firewall rules, or using a hotspot to access a VPN could break network connectivity or offer attackers alternate pathways for spying on victims. Users employing a VPN to maintain as much privacy as possible should exercise more caution when choosing which public hotspots to use.

In related news, every VPN on iOS possibly still leaks data that could identify an iPhone or iPad's IP address, four years after ProtonVPN first reported the problem to Apple. As of August 2023, the issue persists. IVPN removed the kill switch on its iOS app in response, but it's unclear if iOS 17 has resolved the problem.

Permalink to story:

 
So you need to be on the same network, hence this only affects consumers using public wifi?

Is that the short version?
 
A VPN in the last couple of years has bin upsold as the ultimate thing to privacy or not being spied on.

You have to be a complete ***** to leave your CC with a company and expect that all your communication will be safe. There's various treaties that force ISP's or VPN's to "open up" or have some sort of backdoor build in, that tracking or identifying it's users is technically possible.

https://www.cryptostorm.is/

 
A VPN in the last couple of years has bin upsold as the ultimate thing to privacy or not being spied on.

You have to be a complete ***** to leave your CC with a company and expect that all your communication will be safe. There's various treaties that force ISP's or VPN's to "open up" or have some sort of backdoor build in, that tracking or identifying it's users is technically possible.

https://www.cryptostorm.is/
Yeah I'm dubious. I have Nord VPN and every time I need to access my internet banking I'm either on my mobile data or my local home WiFi network and I turn my VPN off. I literally only use a VPN for accessing web services that are blocked by my ISP.
 
From the article: "defeating the entire purpose of the technology".

This is a biased perspective. The attack makes the remote node vulnerable but many of us use VPNs to protect the infrastructure side of the tunnel. e.g. a secure development cloud on private class IPs within a corporate network that requires a VPN tunnel to reach. This attack might act as a denial of service for this common use case but absolutely would not leak data as described by the author.
 
This is terrifying! Hackers could have been bypassing VPNs for years and we wouldn't even know? The fact that there's no real fix for most operating systems is scary. Maybe using a VPN on public Wi-Fi isn't such a great idea anymore. At least there's a workaround for Linux users... gotta love open source!
 
Yeah I'm dubious. I have Nord VPN and every time I need to access my internet banking I'm either on my mobile data or my local home WiFi network and I turn my VPN off. I literally only use a VPN for accessing web services that are blocked by my ISP.

Truth be told; for a long time ive used a insecure way (on purpose) of connecting through POP3 without using SSL while using a VPN. I logged who actually opened up that mailbox if there was any claims to such evidence that VPN's use your data, which is not true.

But if a warrant was given out - they can't behind their TOS as they are obligated and esp. in countries with such rulement to open up.
 
This sounds alot like what happened to the TOR network where your data would go in to the entry node encrypted and come out the other ends exit node as unencrypted data and a lot of diplomatic documents and stuff were garnered by the CIA and NSA
 
Sorry, this article is either written by someone who doesn't know what they are talking about, or it's intentional clickbait.

The crux of the argument is that if you accept unsolicited routing directives from your lan, then they can be set to divert traffic to another system.
Well, duuuh

We were playing with this sort of thing 30 years ago.

No system I use, or have ever set up would be vulnerable to this, and that's would be across many operating systems.... even windows!

A better summary for this article could be "Incorrectly configured computers can behave incorrectly"

 
Uh oh, NSA must be watching about VPN's! got an email from Techspot: "Hotlynx16, your post was edited or reported for containing unsuitable content. We want to keep TechSpot an open place for high quality tech discussion". Doesn't say what post!!
 
Back