TunnelVision: The New VPN Bypass Technique Exposing Users to Surveillance
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
Notably, this technique, while sophisticated, doesn’t disrupt the VPN’s appearance of connectivity, leaving users unaware of the breach. Furthermore, TunnelVision isn’t exclusive to any particular VPN provider or implementation, posing a widespread threat to IP routing-based VPN systems.
Despite its recent discovery, Leviathan Security speculates that the vulnerability exploited by TunnelVision may have existed within DHCP since 2002, potentially exploited by threat actors in the past.
To counteract this looming threat, VPN providers are urged to implement network namespaces on compatible operating systems, effectively isolating interfaces and routing tables from local network control. Additional mitigation strategies include deploying Firewall Rules, disregarding Option 121, utilizing Hot Spots or Virtual Machines, and avoiding untrusted networks.
Trending: Offensive Security Tool: pphack
Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]
Source: securityaffairs.com