It turns out that the Chrome extension 'FreeVPN,' which has been installed 100,000 times, secretly takes screenshots of users' screens and sends them to an external server



It has been discovered that '

FreeVPN.One ', available on the Chrome Web Store, is secretly taking pictures of users' screens and sending them to external servers without the user's permission.

SpyVPN: The Google-Featured VPN That Secretly Captures Your Screen | Koi Blog
https://koi-security.webflow.io/blog/spyvpn-the-vpn-that-secretly-captures-your-screen

Chrome VPN Extension With 100k Installs Screenshots All Sites Users Visit
https://cyberinsider.com/chrome-vpn-extension-with-100k-installs-screenshots-all-sites-users-visit/

According to security firm Koi Security, FreeVPN.One uses Chrome's privileged API, chrome.tabs.captureVisibleTab, to secretly take screenshots of websites. It waits for the website to render (using delays) to improve the quality of the screenshot, bundles metadata such as the page URL, tab ID, and a unique user ID, and then sends the screenshot to a server called aitd[.]one/brange.php.



In addition to the above behavior, FreeVPN.One also offers a feature called 'AI Threat Detection,' which, when used by a user, explicitly takes screenshots and sends them to a server called aitd[.]one/analyze.php for threat analysis. While

the policy clearly states that 'AI Threat Detection' itself 'takes screenshots and sends them to a server,' the problem is that screenshots are already being taken and sent externally even before the user uses AI Threat Detection.



According to Koi Security, FreeVPN.One was originally distributed as a regular VPN tool, but an update in April 2025 gave users access to all the sites they visited. Koi Security points out that the permissions it requests are 'far in excess of what a VPN requires.'

In May 2025, the domain aitd[.]one was registered on FreeVPN.One, and screenshot collection began in July. In the same month, developers realized that the data being transmitted was easily detectable and added encryption, making it difficult to verify and analyze with network monitoring tools.

When Koi Security contacted the FreeVPN.One developer, they responded that the automatic screenshot feature only works on suspicious domains. However, it actually works on domains that are not considered suspicious, such as Google Spreadsheets.

The developer also said that while screenshot taking is available to all users by default, they will ask for explicit consent in the future, and that screenshots are not saved and are only used for threat analysis.

However, there is no transparency about how the images sent to the server are analyzed, so it is impossible to verify whether privacy is protected as the developer claims. Worse yet, there is no evidence that the developer even exists, and the site linked to the developer's contact email address is a free homepage with no company details. When Koi Security asked the developer to verify the company's authenticity, they reportedly stopped responding.

At the time of writing, FreeVPN.One is available on the Chrome Web Store and has been given Google's 'Identity Verified' and 'Recommended' badges.



Koi Security said, 'Chrome claims to conduct security checks on extension updates through automated scans, human review, and monitoring for malicious code and behavior changes. However, in reality, these safeguards were insufficient. This case shows that dangerous extensions can slip through even with these safeguards, highlighting security flaws in the Chrome Web Store.'

in Software,   Security, Posted by log1p_kr