
A popular Chrome VPN extension named FreeVPN.One, which had over 100,000 installations, a verified badge, and featured placement in the Chrome Web Store, has been exposed as spyware. Security researchers revealed that instead of protecting user privacy, the extension secretly captured screenshots of browsing activities and exfiltrated sensitive data to remote servers.
This discovery raises serious concerns about the Chrome extension ecosystem, as the malicious tool operated undetected for months under the guise of a trusted VPN service.
The spyware used a two-stage surveillance system.
The extension also collected device metadata and IP geolocation data, which it encoded in base64 before sending to its servers.
Although the extension promoted an “AI Threat Detection” feature, analysis revealed it was just a cover for ongoing screenshot surveillance. In the latest version (v3.1.4), developers added AES-256-GCM encryption with RSA key wrapping, making the exfiltration harder to detect.
Researchers found that FreeVPN.One started as a legitimate proxy-based VPN, but gradually turned malicious:
This gradual transition allowed the extension to maintain its verified status on the Chrome Web Store, avoiding detection during updates.
The developer who was contacted stated that the screenshots were taken as part of a tool called "Background Scanning" that was intended for dubious domains. Additionally, they pledged future opt-in consent.
However, researchers confirmed screenshots were taken from benign websites such as Google Sheets and Google Photos, disproving the developer’s defense. Moreover, the only traceable company information leads to phoenixsoftsol.com, a barebones Wix-based website with no verifiable details. The developer stopped responding when pressed for more information.
This issue reveals significant security flaws in the extension vetting procedure used by the Chrome Web Store. Both human inspections and automated scanning were unable to identify how FreeVPN works. One turned into a full-fledged spyware operation after switching from a reliable VPN.
Experts stress the need for more robust governance and monitoring systems, warning that businesses and individual users that depend on third-party browser extensions face increasing risks.