MTN Security . Why company deal notorious hackers trying steal them? The reason is are looking for traffic .

Because according various cybersecurity researcher group report. is vulnerability backdoor the MTN network. Allows experienced hackers using DNS tunneling hacking .

that the Domain (DNS) is group of servers on the . Which enable the of humanly readable . Such as www. as an example into what we call an Protocol addresses.

Tunneling hacking skills refer to an intelligent practice for hacker of routing traffic. Over a port or a  protocol, it does not usually over.

practice of tunneling hacking is somehow legal a certain level. Because the exact process your Virtual Private Networking, VPN services do to secure your and limited traffic.

does the DNS tunneling ?

The DNS tunneling is like when someone a traffic the protocol used for DNS. , this is not an activity. This of operation usually orchestrated by hackers. Individuals who want to bypass controls put place to safeguard a network.

According to specialist. It is technically to free data using DNS tunneling on the MTN network. The specialist continues and eventually it not be a remarkably fast because of the limitation of the DNS protocol.

Nevertheless, security analyst noticed that connections to MTN’s DNS servers reset often. It’s a move without any doubt”, put as a countermeasure to interrupting persistent connections, on the network.

Nonetheless, is another to reach MTN’s root DNS servers even if you have no airtime or data, the researcher added.

Besides the existant vulnerability presented by DNS tunneling, the cybersecurity specialist does other issues the captive portal that is displayed when you run out of data and airtime.
Crucially, the page does not have a security certificate all. The reason for is the IP address of the MTN No Funds domain (196.11.240.215) is equally associating several other MTN .

This bridge the network could exploited by phishing with low Hacking skill easy.

Why MTN is resisting under ?
It’s is to know that “DNS tunneling is just of types of cyber attacks that operators on a constant basis,” executive for corporate affairs MTN Jacqui O’Sullivan in an

“MTN is constantly monitoring any potential security attacks or bypass mechanisms, and built-in protocols to such attacks.”

O’Sullivan MTN aware of the exploit identified by the researcher, as well as the older example provided in report about the vulnerabilities discovered. “In both instances measures we’re putting in place to limit MTN’s exposure,” O’Sullivan said.

“MTN proactively manages this environment and because the attempted attacks are constantly changing, we on identifying the abuse and then implementing the necessary controls.”