Cyberattack tools can be disguised as VPNs through malicious apps.

Discover ways to protect yourself from potentially harmful apps.

Cyberattack tools can be disguised as VPNs through malicious apps.
Cyberattack tools can be disguised as VPNs through malicious apps.

If you value your data and privacy, VPNs are crucial. They establish a secure, encrypted link between your device and the internet, concealing your IP address and safeguarding your online actions.

Not all VPN apps are trustworthy; some are fraudulent and aim to steal your personal information.

In the third quarter of 2024, the number of users encountering fake VPN apps increased by 2½ times compared to the second quarter globally. These apps were either malware or programs that could be used by malicious actors.

The increase in fake VPN apps is a concern, and here's how to protect yourself.

cellphone vpn
A VPN on a cellphone   (Kurt "CyberGuy" Knutsson)

What you need to know about the surge in fake VPN apps

In May 2024, law enforcement shut down a botnet that was created using several free VPN services, including MaskVPN, DewVPN, PaladinVPN, ProxyGate, ShieldVPN, and ShineVPN.

As a result of installing VPN apps, their devices became proxy servers, directing other internet traffic.

Over 19 million unique IP addresses in 190 countries make up this massive botnet, which may be the largest ever created. Those controlling the botnet sold access to infected devices to other criminals, who utilized them for cyberattacks, money laundering, and fraud.

laptop vpn
A VPN on a laptop  (Kurt "CyberGuy" Knutsson)

Don’t trust free VPNs

Free VPN apps may not prioritize your safety, so it's essential to exercise caution.

  • Data sharing: Many free VPNs share user data with third parties.
  • Free VPNs with weak encryption pose a threat to your online security, as about 36% of them use such encryption methods.
  • Almost 90% of free VPNs disclose some information, with 17% revealing more than necessary.
  • Unreliable connections: More than half of free VPNs have unstable connections.
  • Almost 70% of people request permissions they don't need, such as tracking their location (20%) or accessing their installed apps (46%).

Why people fall for fake VPNs

The demand for VPN apps is increasing across all platforms, including smartphones and computers. While users may think that finding a VPN app in an official store, such as Google Play, means it's safe to use, this is not always the case. Free services can often be a trap.

Choose trusted VPN services for optimal security and privacy

If you need a VPN, choose a well-known, trusted service that is not free. Look for those that are discussed on mainstream sites and have positive reviews. If you're unsure where to begin, I've compiled a list of my top VPNs. I've personally tested them and can assure you they will keep your data safe. For the best VPN software, check out my expert review of the top VPNs for secure browsing on your Windows, Mac, Android, and iOS devices.

woman with phone
A woman looking at a VPN app on her phone   (Kurt "CyberGuy" Knutsson)

7 important tips for choosing and using VPNs

To ensure your online privacy, follow these seven crucial steps to select a trustworthy VPN.

Trusted official app stores are the safest option for downloading apps. These platforms, such as the App Store for iOS and Google Play Store for Android, have security measures in place to detect and remove fake or harmful apps. It's important to avoid downloading apps from random websites or third-party stores, as they are more likely to host malicious software. Even on official stores, it's crucial to check the app's reviews, ratings, and download count to ensure its trustworthiness.

Be cautious when granting app permissions during installation, and only allow permissions that align with the app's functionality. Review and manage app permissions in your settings on both iOS and Android to ensure you have not granted unnecessary permissions.

To enhance security beyond a password, implement two-factor authentication (2FA) for your VPN accounts.

Ensure that all VPN-related software, including clients, servers, and networking hardware, are updated regularly to receive the latest security patches and enhancements.

Protect your data with VPN services that employ strong encryption protocols like AES-256.

Keep track of VPN traffic and logs to detect any unusual patterns that could signal security problems.

7. Protect your device with a robust antivirus software: A powerful antivirus program can help detect and remove malware before it harms your device. Many antivirus apps also include features such as web protection, anti-phishing tools, and the ability to scan new apps for threats. While there are free options, premium versions often provide more comprehensive protection. Choose a reputable cybersecurity brand when selecting an antivirus solution.

Kurt’s key takeaway

Free VPN apps may seem convenient, but they can pose a serious threat to your online security. They often have weak security measures, leak your data, or demand permissions that compromise your privacy. To safeguard your online activity, consider investing in a reliable, paid VPN service.

Please inform us at Cyberguy.com/Contact how frequently you verify the trustworthiness of apps you install.

To receive more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by visiting Cyberguy.com/Newsletter.

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

by Kurt Knutsson, CyberGuy Report

tech

Limited space on new laptop: Tips for managing photos and videos

Limited space on new laptop: Tips for managing photos and videos

tech
Stopping robocalls on a flip phone: a guide.

Stopping robocalls on a flip phone: a guide.

tech
Malware-laden emails for fake job interviews

Malware-laden emails for fake job interviews

tech
Your credit score could be negatively impacted by these mistakes.

Your credit score could be negatively impacted by these mistakes.

tech
How to repurpose your old iPhone for a new purpose

How to repurpose your old iPhone for a new purpose

tech
The world is privy to the robot training techniques of a Chinese tech company.

The world is privy to the robot training techniques of a Chinese tech company.

tech
An early supernova was captured in photos by a powerful Webb Telescope.

An early supernova was captured in photos by a powerful Webb Telescope.

tech
A prosthetic hand controlled by a soft robotic armband allows users to move their artificial limb with ease.

A prosthetic hand controlled by a soft robotic armband allows users to move their artificial limb with ease.

tech
100 million Apple users face potential data theft due to Mac malware.

100 million Apple users face potential data theft due to Mac malware.

tech
Experience the excitement of eVTOL racing.

Experience the excitement of eVTOL racing.

tech
Company that sells Americans' location data reports massive breach, claims hackers

Company that sells Americans' location data reports massive breach, claims hackers

tech
One will leave you wanting a shape-shifting AI Transformer home.

One will leave you wanting a shape-shifting AI Transformer home.

tech
Shell's experimental big rig moves the future of trucking forward.

Shell's experimental big rig moves the future of trucking forward.

tech