Monday, May 5, 2025
HomeSecurity NewsChinese Man Sentenced to Five Years Prison for Illegally Running VPN Service

Chinese Man Sentenced to Five Years Prison for Illegally Running VPN Service

Published on

SIEM as a Service

Follow Us on Google News

A chinese man Wu Xiang Yang sentenced to five years and six months also fined 500,000 yuan for running private VPN service with obtaining the relevant business license.

Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more.

Also Read Top 5 Best Free VPN for Android to Surf Anonymous – 2017

- Advertisement - Google News

Wu Xiangyang alleged and sentenced it as an illegal business crime to set up his own VPN server on the Internet and provided a member account and login software.

This VPN service used to browse some foreign websites and restricted website by the Republic of China Telecommunications.

VPN is based on the trust by VPN service provides and strong security policy should have to follow by services provides such ads when a user accesses their VPN services they may use to record certain information such as cookies, IP Address, unique device ID and application information that installed on the device.

But they do not collect any information about the stored logs associated with the concern IP Address including the online Activities, Email ID, Mobile number, credit card information.

This case charged as “Ordinance” and “Criminal Law” and other relevant laws and regulations by the Republic of China.

Wu Xiangyang also some VPN member account password written to the hardware router, making the modified router can log in directly to the VPN, to achieve the ability to listen to foreign websites audio and video programs.

According to 365jia, Wu Xiangyang used Chinese online shopping website “Taobao” for shopping website for to set up shop and VPN services website  “Where Dog VPN” was used for general user rental or sales of VPN software, VPN router hardware, trading thousands of times.

Also Read Edward Snowden Privacy Protection app turns your Android phone Into A Security System

He earned about more than 50 million illegally through this VPN service. china doesn’t block VPN Service but VPN service providers need to get official permission from Government.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Luna Moth Hackers Use Fake Helpdesk Domains to Target Victims

A recent investigation by cybersecurity firm EclecticIQ, in collaboration with threat hunters, has exposed...

SonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control

Cybersecurity researchers have uncovered a dangerous new exploitation technique, dubbed the "SonicBoom Attack Chain,"...

Researcher Uses Copilot with WinDbg to Simplify Windows Crash Dump Analysis

A researcher has unveiled a novel integration between AI-powered Copilot and Microsoft's WinDbg, dramatically...

Apache Parquet Java Vulnerability Enables Remote Code Execution

A high-severity vulnerability (CVE-2025-46762) has been discovered in Apache Parquet Java, exposing systems using...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...