Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

Millions of Android, iPhone Users Could Be Sending Data to China

By Jordyn Alger, Managing Editor
Person holding cellphone

DuoNguyen via Unsplash

June 30, 2025

According to the Tech Transparency Project (TTP), Apple and Google app stores are offering private browsing apps owned by Chinese companies. TTP identified these apps more than six weeks ago in a report, but it appears that no action has been taken in response. 

TTP suggests that Apple and Google may be profiting off of these apps, risking Americans’ privacy and national security. 

The apps in question are virtual private networks (VPNs). Chinese-owned VPNs could be a privacy and security concern for American citizens, as Chinese companies could be obligated to share sensitive data with the Chinese government. 

The report found that out of the top 100 free VPNs in the United States Apple App Store in 2024, 20 of them showed signs of Chinese ownership.

Below, security leaders share their thoughts on this report. 

Security Leaders Weigh In

James Maude, Field CTO at BeyondTrust:

These threats are not entirely new. Free mobile apps have a history of embedding code that connects the user’s device to a proxy network to generate revenue by selling off a small amount of the user bandwidth. This allows a developer to generate revenue in the app without charging the user or relying on ad revenue. The flip side to this is what these device proxies are then used for as they provide a network of residential IP exit nodes that can be used in web scraping, credential stuffing and identity theft by criminal organizations. They effectively provide a route for a threat actor with access to compromised credentials to evade geolocation blocks (only allow logins from U.S.) by allowing them to login from a residential IP perhaps in the same city and using the same ISP as the victim.

In age where identity is the new perimeter, these free VPN services may not only process sensitive browsing data through foreign servers, they can also create large peer-to-peer networks of proxy exit nodes which can potentially be misused to both target and surveil identities. They can also provide a mechanism to exploit them using a vast network of exit nodes near their target.

Example of my previous 2019 research on the true cost of free VPNs. 

Randolph Barr, Chief Information Security Officer at Cequence Security:

If Apple and Google are unwilling or unable to enhance their oversight, it’s likely this will accelerate demand for more advanced, enterprise-controlled security solutions, particularly in environments where sensitive data is accessed through mobile devices. Mobile Device Management (MDM) and Bring Your Own Device (BYOD) programs will increasingly need to integrate AI-driven app vetting and behavioral analysis into their security stack.

While MDM and BYOD controls are not a silver bullet, incorporating AI into these solutions can strengthen a layered security approach, raising the bar for attackers and reducing organizational risk, even when app stores fall short. For CISOs, this situation underscores a broader reality: security leaders must build resilience while enabling innovation. They need to communicate the value of controls like AI-enhanced MDM not just as risk mitigation, but as enablers of secure digital agility. If Apple and Google won’t prioritize user protection through better enforcement, enterprises will have to fill that gap themselves with smarter, adaptive tools that protect both data and business continuity.

Mr. Vijay Dilwale, Principal Security Consultant at Black Duck:

Chinese law requires collaboration with state intelligence efforts by businesses. This is not optional, but legislation. As a result, all information traveling through these apps could possibly be available for the Chinese government to access.

Worryingly is that the majority of these apps continue to sit in top app stores without complete transparency about their ownership. In some cases, even Apple and Google could also be profiting from them. This is not merely a consumer protection issue. It is a national security issue. Platforms should do more to demand open ownership, stricter vetting for risky applications like VPNs, and reassessing how they make money off of tools that carry this kind of risk.

Chad Cragle, Chief Information Security Officer at Deepwatch:

It’s time for the platforms to take responsibility and set the example. You can’t claim to prioritize privacy if you're letting other parties control the playbook. If they don't properly scrutinize these apps, they’re not just passively allowing it—they’re helping to create the problem. And let's be honest, this isn't just about privacy; it’s about national security, too.

KEYWORDS: china data privacy privacy concerns

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Three iPhones

    New iPhone feature could expose employees’ personal information

    See More
  • Printer

    Millions of Printers Exposed to Hacking Due to New Vulnerabilities

    See More
  • Puzzle with missing piece

    Incomplete NVIDIA patch could leave AI infrastructure and data at risk

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Security of Information and Communication Networks

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing