{"id":42003,"date":"2021-07-27T14:31:01","date_gmt":"2021-07-27T14:31:01","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32505\/VPN-Servers-Seized-By-Ukrainian-Authorities-Werent-Encrypted.html"},"modified":"2021-07-27T14:31:01","modified_gmt":"2021-07-27T14:31:01","slug":"vpn-servers-seized-by-ukrainian-authorities-werent-encrypted","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/","title":{"rendered":"VPN Servers Seized By Ukrainian Authorities Weren&#8217;t Encrypted"},"content":{"rendered":"<figure class=\"intro-image intro-left\"><img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2021\/07\/vpn-tunnel-800x450.jpeg\" alt=\"A tunnel made of ones and zeroes.\"><figcaption class=\"caption\"><\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"><a title=\"41 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/gadgets\/2021\/07\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">62<\/span> <span class=\"visually-hidden\"> with 41 posters participating<\/span> <\/a> <\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/p><\/div>\n<\/aside>\n<p><!-- cache hit 603:single\/related:7855a362c3aba75a38b2d09fd0d0e7a4 --><!-- empty --><\/p>\n<p>Privacy tools-seller Windscribe said it failed to encrypt company VPN servers that were recently confiscated by authorities in Ukraine, a lapse that made it possible for the authorities to impersonate Windscribe servers and capture and decrypt traffic passing through them.<\/p>\n<p>The Ontario, Canada-based company <a href=\"https:\/\/blog.windscribe.com\/openvpn-security-improvements-and-changes-7b04ea49222\">said<\/a> earlier this month that two servers hosted in Ukraine were seized as part of an investigation into activity that had occurred a year earlier. The servers, which ran the <a href=\"https:\/\/openvpn.net\/\">OpenVPN<\/a> virtual private network software, were also configured to use a setting that was deprecated in 2018 after security research revealed vulnerabilities that could allow adversaries to decrypt data.<\/p>\n<p>\u201cOn the disk of those two servers was an OpenVPN server certificate and its private key,\u201d a Windscribe representative wrote in the July 8 post. \u201cAlthough we have encrypted servers in high-sensitivity regions, the servers in question were running a legacy stack and were not encrypted. We are currently enacting our plan to address this.\u201d<\/p>\n<h2>Guarantees negated<\/h2>\n<p>Windscribe\u2019s admission underscores the risks posed by an explosion of VPN services in recent years, many from businesses few people have heard of before. People use VPNs to funnel all their Internet traffic into an encrypted tunnel, to prevent people connected to the same network from being able to read or tamper with data or to detect the IP addresses of the two parties communicating. The VPN service then decrypts the traffic and sends it to its final destination.<\/p>\n<p>By failing to follow standard industry practices, Windscribe largely negated those security guarantees. While the company attempted to play down the impact by laying out the requirements an attacker would have to satisfy to be successful, those conditions are precisely the ones VPNs are designed to protect against. Specifically, Windscribe said, the conditions and the potential consequences are:<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<blockquote>\n<ul class>\n<li id=\"2061\" class=\"hg hh df hi b hj ic gn hl hm id gr ho hp ie hr hs ht if hv hw hx ig hz ia ib ip iq ir ec\" data-selectable-paragraph>The attacker has control over your network and can intercept all communications (privileged position for&nbsp;<a class=\"ex ix\" href=\"https:\/\/en.wikipedia.org\/wiki\/Man-in-the-middle_attack\" rel=\"noopener\">MITM attack<\/a>)<\/li>\n<li id=\"0cf4\" class=\"hg hh df hi b hj is gn hl hm it gr ho hp iu hr hs ht iv hv hw hx iw hz ia ib ip iq ir ec\" data-selectable-paragraph>You are using a legacy DNS resolver (legacy DNS traffic is unencrypted and subject to MITM)<\/li>\n<li id=\"1d01\" class=\"hg hh df hi b hj is gn hl hm it gr ho hp iu hr hs ht iv hv hw hx iw hz ia ib ip iq ir ec\" data-selectable-paragraph>The attacker has the ability to manipulate your unencrypted DNS queries (the DNS entries used to pick an IP address of one of our servers)<\/li>\n<li id=\"6b24\" class=\"hg hh df hi b hj is gn hl hm it gr ho hp iu hr hs ht iv hv hw hx iw hz ia ib ip iq ir ec\" data-selectable-paragraph>You are&nbsp;<strong class=\"hi ih\">NOT<\/strong>&nbsp;using our Windscribe applications (our apps connect via IP and not DNS entries)<\/li>\n<\/ul>\n<p id=\"06ab\" class=\"hg hh df hi b hj ic gn hl hm id gr ho hp ie hr hs ht if hv hw hx ig hz ia ib cx ec\" data-selectable-paragraph>The potential impact for the user&nbsp;<strong class=\"hi ih\">if all of the above conditions are true<\/strong>:<\/p>\n<ul class>\n<li id=\"48e8\" class=\"hg hh df hi b hj ic gn hl hm id gr ho hp ie hr hs ht if hv hw hx ig hz ia ib ip iq ir ec\" data-selectable-paragraph>An attacker would be able to see unencrypted traffic inside of your VPN tunnel<\/li>\n<li id=\"58ae\" class=\"hg hh df hi b hj is gn hl hm it gr ho hp iu hr hs ht iv hv hw hx iw hz ia ib ip iq ir ec\" data-selectable-paragraph>Encrypted conversations like HTTPS web traffic or encrypted messaging services would not be affected<\/li>\n<li id=\"27fa\" class=\"hg hh df hi b hj is gn hl hm it gr ho hp iu hr hs ht iv hv hw hx iw hz ia ib ip iq ir ec\" data-selectable-paragraph>An attacker would be able to see the source and destinations of traffic<\/li>\n<\/ul>\n<p id=\"bf52\" class=\"hg hh df hi b hj ic gn hl hm id gr ho hp ie hr hs ht if hv hw hx ig hz ia ib cx ec\" data-selectable-paragraph>It\u2019s important to remember that:<\/p>\n<ul class>\n<li id=\"3525\" class=\"hg hh df hi b hj ic gn hl hm id gr ho hp ie hr hs ht if hv hw hx ig hz ia ib ip iq ir ec\" data-selectable-paragraph>Most internet traffic is encrypted (HTTPS) inside of your VPN tunnel<\/li>\n<li id=\"38a1\" class=\"hg hh df hi b hj is gn hl hm it gr ho hp iu hr hs ht iv hv hw hx iw hz ia ib ip iq ir ec\" data-selectable-paragraph>No historical traffic is at risk thanks to PFS (<a class=\"ex ix\" href=\"https:\/\/en.wikipedia.org\/wiki\/Forward_secrecy\" rel=\"noopener\">perfect forward secrecy<\/a>) which prevents decryption of historical traffic, even if one possesses the private key for a server<\/li>\n<li id=\"32b5\" class=\"hg hh df hi b hj is gn hl hm it gr ho hp iu hr hs ht iv hv hw hx iw hz ia ib ip iq ir ec\" data-selectable-paragraph>No other protocols supported by our servers are affected, only OpenVPN<\/li>\n<\/ul>\n<\/blockquote>\n<h2>Three years late<\/h2>\n<p>Besides the lack of encryption, the company also uses data compression to improve network performance. <a href=\"https:\/\/speakerdeck.com\/skepticfx\/voracle-compression-oracle-attacks-on-vpn-tunnels\">Research<\/a> presented at the 2018 Black Hat security conference in Las Vegas disclosed an attack known as Voracle, which uses clues left behind in compression to decrypt data protected by OpenVPN-based VPNs. A few months later, OpenVPN <a href=\"https:\/\/github.com\/NethServer\/dev\/issues\/5631\">deprecated<\/a> the feature.<\/p>\n<p>The privacy tools-maker said it\u2019s in the process of overhauling its VPN offering to provide better security. Changes include:<\/p>\n<ul>\n<li>Discontinuing use of its current OpenVPN certificate authority in favor of a new one that \u201cfollows industry best practices, including the use of an intermediate certificate authority (CA)\u201d<\/li>\n<li>Transitioning all servers to operate as in-memory servers with no hard disk backing. This means that any data the machines contain or generate live solely in RAM and can\u2019t be accessed once a machine has been shut off or rebooted<\/li>\n<li>Implementing a forked version of Wireguard as the primary VPN protocol<\/li>\n<li>Deploying \u201cresilient authentication backend\u201d to allow VPN servers to function even if there is a complete outage of core infrastructure<\/li>\n<li>Enabling new application features, such as the ability to change IP addresses without disconnecting, request a specific and static IP, and \u201cmulti-hop, client side R.O.B.E.R.T. rules that are not stored in any database\u201d<\/li>\n<\/ul>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>In an email, Windscribe Director Yegor Sak expanded on the steps his company is taking. They include:<\/p>\n<blockquote>\n<p>1. All keys required for server function are no longer stored permanently on any of our servers and exist solely in memory after they are put into operation<\/p>\n<p>2. All servers have unique short-lived certificates and keys generated from our new CA which are rotated<\/p>\n<p>3. Each server certificate has uniquely identifying Common Name + SANs<\/p>\n<p>4. New OpenVPN client configurations enforce server certificate X509 name verification using the common name which is unique.<\/p>\n<\/blockquote>\n<p>He was unusually candid about the lapse, writing:<\/p>\n<blockquote>\n<p>In the meantime, we make no excuses for this omission. Security measures that should have been in place were not. After conducting a threat assessment we feel that the way this was handled and described in our article was the best move forward. It affected the fewest users possible while transparently addressing the unlikely hypothetical scenario that results from the seizure. No user data was or is at risk (the attack vector to make use of the keys requires the attacker to have full control over the victim&#8217;s network with several prerequisites outlined in the above article). The hypothetical situations outlined are no longer exploitable because the final CA sunset process was already completed last week on July 20th.<\/p>\n<\/blockquote>\n<p>It\u2019s not clear how many active users the service has. The company\u2019s <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.windscribe.vpn\">Android app<\/a>, however, lists more than 5 million installs, an indication that the user base is likely large.<\/p>\n<p>The seizure of the Windscribe servers underscores the importance of the kind of basic VPN security hygiene that the company failed to follow. That, in turn, emphasizes the risks posed when people rely on little-known or untested services to shield their Internet use from prying eyes.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32505\/VPN-Servers-Seized-By-Ukrainian-Authorities-Werent-Encrypted.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42004,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9496],"class_list":["post-42003","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentprivacyflawcryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VPN Servers Seized By Ukrainian Authorities Weren&#039;t Encrypted 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VPN Servers Seized By Ukrainian Authorities Weren&#039;t Encrypted 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-27T14:31:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"VPN Servers Seized By Ukrainian Authorities Weren&#8217;t Encrypted\",\"datePublished\":\"2021-07-27T14:31:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\\\/\"},\"wordCount\":1013,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted.jpg\",\"keywords\":[\"headline,government,privacy,flaw,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\\\/\",\"name\":\"VPN Servers Seized By Ukrainian Authorities Weren't Encrypted 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted.jpg\",\"datePublished\":\"2021-07-27T14:31:01+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,privacy,flaw,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentprivacyflawcryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"VPN Servers Seized By Ukrainian Authorities Weren&#8217;t Encrypted\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VPN Servers Seized By Ukrainian Authorities Weren't Encrypted 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/","og_locale":"en_US","og_type":"article","og_title":"VPN Servers Seized By Ukrainian Authorities Weren't Encrypted 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-07-27T14:31:01+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"VPN Servers Seized By Ukrainian Authorities Weren&#8217;t Encrypted","datePublished":"2021-07-27T14:31:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/"},"wordCount":1013,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted.jpg","keywords":["headline,government,privacy,flaw,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/","url":"https:\/\/www.threatshub.org\/blog\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/","name":"VPN Servers Seized By Ukrainian Authorities Weren't Encrypted 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted.jpg","datePublished":"2021-07-27T14:31:01+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,privacy,flaw,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentprivacyflawcryptography\/"},{"@type":"ListItem","position":3,"name":"VPN Servers Seized By Ukrainian Authorities Weren&#8217;t Encrypted"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42003","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42003"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42003\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42004"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42003"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42003"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}