Because according to various cybersecurity researcher group report. There is a vulnerability backdoor in the MTN network. Allows experienced hackers to get free data using DNS tunneling hacking techniques.
Notice that the Domain Name System (DNS) is a group of servers on the Internet. Which enable the translation of humanly readable domains. Such as www.ernstgeorges.com as an example into what we call an Internet Protocol addresses.
This practice of tunneling hacking is somehow legal at a certain level. Because this the exact process your Virtual Private Networking, VPN services do to secure your data and limited Internet traffic.
How does the DNS tunneling work?
The DNS tunneling is like when someone encrypted a network traffic in the protocol used for DNS. However, this is not an everyday activity. This type of operation usually orchestrated by hackers. Individuals who want to bypass controls put in place to safeguard a network.
According to some specialist. It is technically possible to get free data using DNS tunneling on the MTN network. The specialist continues and said eventually it will not be a remarkably fast connection because of the limitation of the DNS protocol.
Nevertheless, Internet security analyst has noticed that connections to MTN’s DNS servers reset often. It’s a safety move without any doubt”, put as a countermeasure to interrupting persistent connections, on the network.
Besides the existant vulnerability presented by DNS tunneling, the cybersecurity specialist does notice other issues with the captive portal that is displayed when you run out of data and airtime.
Crucially, the page does not have a security certificate at all. The reason for is the IP address of the MTN No Funds domain (184.108.40.206) is equally associating with several other MTN domains.
This open bridge in the network could exploited by phishing scams with low Hacking skill easy.
Why MTN is constantly resisting under attack constantly?
It’s is important to know that “DNS tunneling is just one of many types of cyber attacks that operators face on a constant basis,” executive for corporate affairs at MTN Jacqui O’Sullivan said in an interview
“MTN is constantly monitoring any potential security attacks or bypass mechanisms, and has built-in protocols to manage such attacks.”
O’Sullivan said MTN aware of the exploit identified by the researcher, as well as the older example they provided in their report about the vulnerabilities they discovered. “In both instances measures we’re putting in place to limit MTN’s exposure,” O’Sullivan said.
“MTN proactively manages this environment and because the attempted attacks are constantly changing, we focus on identifying the abuse and then implementing the necessary controls.”