A new study reveals potential vulnerability in VPN services on untrusted networks
According to recent research, VPN users may not always be fully protected when using the service on untrusted networks. The study found that attackers on the same network could exploit a flaw in the DHCP standard to redirect a target’s traffic away from the VPN without the user being alerted.
The vulnerability lies in the use of DHCP option 121, which attackers can abuse to force VPN users to connect to a rogue DHCP server. This allows the attackers to intercept and monitor the user’s traffic, putting sensitive information at risk.
These tactics could be used by hackers who have compromised a DHCP server, a wireless access point, or have set up an evil twin wireless hotspot. To minimize the risk, experts suggest that individuals who may be targeted by spear phishing attacks should exercise caution when using VPNs on untrusted networks.
Mitigations for this vulnerability include using devices powered by the Android operating system, setting up a password-locked LAN with a cellular hotspot, and running a VPN from inside a virtual machine. Additionally, researchers warn that VPN providers may be making promises about security that their technology cannot fully deliver.
For those interested in further examining the research, a copy of the study and code to duplicate the findings are available for review. It is vital for VPN users to be aware of these potential threats and take necessary precautions to protect their online activities.
“Prone to fits of apathy. Devoted music geek. Troublemaker. Typical analyst. Alcohol practitioner. Food junkie. Passionate tv fan. Web expert.”