Tag - CyberGhost

CyberGhost Blog Privacy Challenge
BestVPN Independence Day Competition
How to Find New Markets with Real-time Date: A Hootsuite Case Study of CyberGhost
1 Year after the Twitter censorship in Turkey
WebRTC Leak: Are you affected?
Full proof – ‘Regin’ Trojan is an NSA Tool
Fake Leak: No, CyberGhost has NOT been hacked

CyberGhost Blog Privacy Challenge

As you already know, we really like to improve things everyday and we are always counting on your feedback for that.

If you come here often, you’ve probably noticed that lately we made some changes in the design and structure of our articles.

We want to make this blog the number 1 source for Privacy and Security news.

And today we’re officially launching our redesigned blog through the CyberGhost Blog Privacy Challenge!


Check our new blog design  and you can win a CyberGhost Premium Plus subscription.

There are 15 ways you can enter our Challenge, the more you use the more chances you have to win.

Feel free to share your feedback on the new design.

Hurry up! Competition ends on 28th of October 2015. We’ll extract the 10 winners through the app and we’ll announce them by email.

BestVPN Independence Day Competition

Our friends from Best VPN relaunched their website this weekend, on 4th of July.To mark this event they organized a competition, Independence Day Competition, together with a number of VPN providers, including CyberGhost.


Since CyberGhost stands for privacy and freedom, we decided to join this competition, and offer a celebrating discount of 50%.

If you enter Best VPN’s competition you have the chance to win a 13″ MacBook Air, or 5 Premium VPN accounts, including one from CyberGhost. You can find more details about the competition here.

Good luck everyone!

How to Find New Markets with Real-time Date: A Hootsuite Case Study of CyberGhost

At the begining of this month we got featured on Hootsuite’s blog thanks to uberVU, our social media social management platform, and we are really grateful for that.

Hootsuite is the world’s most widely used social management platform in the world and so much more.  More than 10 million users, including 744 of the Fortune 1000 companies, use Hootsuite to manage their social media programs across multiple social networks.

UberVU, a successful Romanian start-up was aquired by Hootsuite in 2014.


They wanted to know how we fought against online censorship in Turkey, back in March 2014, when Twitter was blocked there by Erdogan’s Government.

You can read the entire case study here.

CYber hoot

Let us know if you liked it or if you have suggestions.

Have a great weekend, Ghosties!

1 Year after the Twitter censorship in Turkey

Wow! It’s already been a year since the Gezi‬ protest in ‪#Turkey‬ against online censorship and the Twitter block!
In these protests, a 15yr old boy, ‪‎BerkinElvan‬, was deadly injured.

Back then, we did our best to help people in Turkey. Ten of thousands of people in Turkey were able after that to sent images to the world and boicot the censorship.
It’s sad to see that even after a year, the police detains protesters, as we read in The Hurriyet Daily News.


[photo credit: The Hurriyet Daily News]

We’ll keep fighting for the ‪#‎FreeInternet‬!

Spread our message and support freedom of speech and the Free internet.

WebRTC Leak: Are you affected?

A lot of fuss for little trouble: Browser video chat renders VPN worthless, it says. Or: Firefox and Chrome reveal original IP address. Or: Deanonymisation via WebRTC. However: Turns out, very few are affected, because the vast majority operates behind a router and it is shielded by default – and even those, who actually are affected, can resolve the issue with little effort.

So, what’s this all about?

It’s about WebRTC, a video chat technique for real time communication directly inside modern browsers like Firefox and Chrome, which, as a side effect, can help to unveil a user’s original IP address, even though she or he is camouflaged by a VPN. Theoretically. In the real world the possible leak just affects users who are directly connected to the Internet with a modem. The WebRTC makes it possible to read all registered IP addresses inside the network card. All others should be safe, even though they use one of the mentioned browsers. From behind a router, all WebRTC is going to see will be in most cases a bunch of local IP addresses, such as 192.168.178.xxx and alike, which are common in all local networks and therefore worthless in terms of tracking.

U test

If your browser is affected, can be tested very fast on the CyberGhost WebRTC IP detection page. Just open your browser and visit this page: WebRTC Real IP Detection.



If your real IP is exposed, start CyberGhost, clean your browser’s cache (by hitting ‘F5′) and visit the page again. If you’re unlucky and your IP is still exposed, install either the WebRTC Block plug-in for Chrome or the Disable WebRTC plug-in for Firefox.


Full proof – ‘Regin’ Trojan is an NSA Tool

If the world really needed more proof to realise the scale on which the NSA machinery operates, a new and irrefutable proof was released today.

On January 17 2015, Spiegel.de published an article based on documents obtained from Edward Snowden and provided a copy of a malicious program named “QWERTY” ), supposedly used by several governments in their Computer Network Exploitation (CNE)operations.

Today, the same news publication released an article, demonstating the same code provenience and indentical  functionality of  “QWERTY” malware to the Regin 50251 plugin.

Regin/Querty Vergleich Kaspersky


Given the fact that the QWERTY keylogger doesn’t function as a stand-alone module, only in tandem with kernel hooking functions provided by the Regin module 50225, it was concluded that the QWERTY malware developers and the Regin developers are the same or working together.

You can read here all the mind-binding conclusions of this ground breaking analysis that states once again that mass-surveillance is more than a fact, it’s a threat.

Fake Leak: No, CyberGhost has NOT been hacked

Contrary to the claims of an unknown hacker group, initially issuing themselves as Anonymous hacker, no credit card information has been stolen from CyberGhost’s servers and published. The reason is obvious: CyberGhost itself handles no payments and therefore has no access to credentials or has any infrastructure to save it. Accordingly, the published list only contains a rather lame collection of expired serial numbers from past promotions …

At Christmas, a group of anonymous hackers filled the headlines, presenting a Sony hack and, later on, asserted via Twitter, to have hacked various companies and stolen their customer data, including UbiSoft, VCC, Brazzers, UFC TV, XBL Gamers, Twitch TV, Amazon, Hulu Plus, Dell, Walmart , EA Games, and, ultimately, CyberGhostVPN. Initially known as ‘Anonymous’, then as ‘Lizard Squad’, the group seemed to have access to different companies and collected a list of over 13,000 accounts on Amazon, Playstation, Xbox Live, Hulu Plus, Walmart and other retailers as well as entertainment and adult platforms. The list includes credit card numbers, security codes and expiration dates. As a little extra, the hacker also published a copy of the controversial Kim de Jong lampoon movie ’The Interview’.


Of course we can’t say anything about the truth of the allegations regarding the other affected companies, this is still to be reviewed, but as far as CyberGhost is concerned, we can give the all clear. CyberGhost itself does not accept payments and therefore has no data collection of credentials or else. In fact CyberGhost relies for payment processing on the e-commerce company cleverbridge – whose name is not on the list.

So what exactly has being published then, if not credit card data? Well, a series of expired serial numbers for CyberGhost subscriptions, grabbed at earlier campaigns and other promotions, plus some occasional license keys from recent actions (which were disabled during the last few days). So the purpose of the publication is rather unknown; it neither proves the existence of a vulnerability nor does it benefit someone.


© 2015 CyberGhost