Three families of VPN apps with combined Google Play download counts exceeding 700
million share not only common ownership but hardcoded cryptographic credentials,
including Shadowsocks passwords embedded in their APKs. An attacker who extracts
these hardcoded passwords can passively decrypt all traffic of users of these apps.
Business filing and APK analysis linked the families to the same operators; one
previously-identified family (Innovative Connecting / Autumn Breeze / Lemon Clove)
had already been linked to the People's Liberation Army.
From 2025-mixon-baca-hidden — Hidden Links: Analyzing Secret Families of VPN Apps
· Abstract, §4, §5
· 2025
· Free and Open Communications on the Internet
Implications
Hardcoded shared Shadowsocks passwords are a catastrophic key-management failure; every Shadowsocks deployment must use per-user or per-installation unique credentials generated at install time, never compiled into the binary.
Users relying on high-download-count VPN apps from opaque ownership structures are at greater risk of traffic interception than users of open-source tools with verifiable server infrastructure; circumvention tool providers should publish verifiable ownership and code provenance.