"He passed through our filters and was able to take advantage of our network," he wrote. "We analyzed the incident and built the necessary measures in our processes to ensure that such incidents do not occur and deactivated his service."
Scrutiny into Hola is now coming from other sources. Vectra, a computer security company, studied Hola and concluded it "contains a variety of features that make it an ideal platform for executing targeted cyber attacks."
The communication protocol used by Hola, for example, has been found in five malware samples on VirusTotal, Vectra wrote. "Unsurprisingly, this means that bad guys had realized the potential of Hola before the recent flurry of public reports by the good guys."
Sign up for Computerworld eNewsletters.