Chrome VPN Extension With 100K+ Installs Exposed as Spyware

Published
Written by:
Rachita Jain
Rachita Jain
VPN Staff Editor

A popular Chrome VPN extension named FreeVPN.One, which had over 100,000 installations, a verified badge, and featured placement in the Chrome Web Store, has been exposed as spyware. Security researchers revealed that instead of protecting user privacy, the extension secretly captured screenshots of browsing activities and exfiltrated sensitive data to remote servers.

This discovery raises serious concerns about the Chrome extension ecosystem, as the malicious tool operated undetected for months under the guise of a trusted VPN service.

How the Extension Collected User Data

The spyware used a two-stage surveillance system.

The extension also collected device metadata and IP geolocation data, which it encoded in base64 before sending to its servers.

Sensitive data being exposed by a chrome VPN extension
Credit: KOI

Although the extension promoted an “AI Threat Detection” feature, analysis revealed it was just a cover for ongoing screenshot surveillance. In the latest version (v3.1.4), developers added AES-256-GCM encryption with RSA key wrapping, making the exfiltration harder to detect.

From VPN Tool to Spyware

Researchers found that FreeVPN.One started as a legitimate proxy-based VPN, but gradually turned malicious:

This gradual transition allowed the extension to maintain its verified status on the Chrome Web Store, avoiding detection during updates.

Screenshot capture handler: captures the tab and uploads it to aitd.one servers
Credit: KOI

Developer Response Raises More Questions

The developer who was contacted stated that the screenshots were taken as part of a tool called "Background Scanning" that was intended for dubious domains. Additionally, they pledged future opt-in consent.

However, researchers confirmed screenshots were taken from benign websites such as Google Sheets and Google Photos, disproving the developer’s defense. Moreover, the only traceable company information leads to phoenixsoftsol.com, a barebones Wix-based website with no verifiable details. The developer stopped responding when pressed for more information.

Broader Implications

This issue reveals significant security flaws in the extension vetting procedure used by the Chrome Web Store. Both human inspections and automated scanning were unable to identify how FreeVPN works. One turned into a full-fledged spyware operation after switching from a reliable VPN.

Experts stress the need for more robust governance and monitoring systems, warning that businesses and individual users that depend on third-party browser extensions face increasing risks.

Indicators of Compromise (IoCs)


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: