When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

But what if those who use these services are professional government-backed hackers?

This allows its users to bypass a company’s firewall, for instance, while blending into legitimate traffic.

Hand with mobile phone and VPN application, Chinese flag on laptop screen on the background

#ESETresearch released its latest APT Activity Report covering April to September 2024 (Q2 2024Q3 2024).

1/2 pic.twitter.com/HazCFT55UsNovember 7, 2024

Webworm wasn’t the only group regularly deploying SoftEther VPN, either.

Researchers did not name the compromised organization.