Why ‘No‑Log’ VPNs Are Lying: Inside a 1.2 TB Data Leak of Seven Providers

A recent investigation uncovered a 1.2 TB leak containing personal data of up to 20 million users from seven VPN services that claim to keep no logs, revealing email addresses, passwords, IPs, device details, and connection logs, and prompting urgent security recommendations.

IT Architects Alliance
IT Architects Alliance
IT Architects Alliance
Why ‘No‑Log’ VPNs Are Lying: Inside a 1.2 TB Data Leak of Seven Providers

Researchers from vpnMentor discovered a 1.2 TB data breach on a shared server used by seven VPN providers that advertise a strict no‑log policy. The exposed data includes personal identifying information (PII) for potentially up to 20 million users, such as email addresses, plaintext passwords, home addresses, and IP addresses.

In addition to PII, the server stored extensive internet activity logs, casting serious doubt on the providers' no‑log claims. The affected VPNs are UFO VPN, FAST VPN, FREE VPN, SUPER VPN, Flash VPN, Secure VPN, and Rabbit VPN. All seven services share a common development framework and application code, suggesting a white‑label solution where the same codebase is rebranded for different companies.

To verify the breach, researchers used the UFO VPN app, connected to various global servers, and monitored the traffic. Their activity was recorded in real time, capturing the account creation details (username and password) as well as device information, source IP, ISP, approximate location, device type, and unique device ID. The logs also revealed which VPN server the user connected to, including its region and IP address.

Impact and Recommendations

The exposure of these details poses multiple risks:

Compromised user credentials can lead to account takeover on other services where the same password is reused.

Detailed connection logs enable attackers to profile user behavior, location, and browsing habits.

Cyber‑criminals can leverage the data for targeted phishing and social engineering attacks.

Typical reasons users adopt VPNs include protecting communication security, accessing geo‑restricted content, bypassing IP‑based restrictions, and political activism. The breach undermines all these use cases.

Following responsible disclosure principles, the researchers reported the vulnerability to the VPN providers on July 5 and alerted Hong Kong’s Computer Emergency Response Team on July 8. The compromised servers were taken offline on July 15.

**Recommendation:** Users of the seven listed VPN services should consider switching to alternative providers with verifiable no‑log policies and should change passwords for any accounts that reuse the same credentials as the VPN services.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

recommendationprivacyinformation securitydata breachVPNno‑log
IT Architects Alliance
Written by

IT Architects Alliance

Discussion and exchange on system, internet, large‑scale distributed, high‑availability, and high‑performance architectures, as well as big data, machine learning, AI, and architecture adjustments with internet technologies. Includes real‑world large‑scale architecture case studies. Open to architects who have ideas and enjoy sharing.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.