MTN Network Security . Why this company deal notorious hackers trying steal from them? reason are traffic tools.

Because according various cybersecurity researcher group report. vulnerability backdoor in MTN network. Allows experienced hackers to using DNS tunneling hacking techniques.

that (DNS) group of servers on . Which enable translation of humanly readable . Such as as example what we Protocol addresses.

Tunneling hacking skills refer to intelligent practice hacker of routing network traffic. a port or a  protocol, does not .

This practice of tunneling hacking is somehow legal at a certain level. Because this the exact process your Virtual Private , VPN do to secure your and limited traffic.

does the DNS tunneling work?

The DNS tunneling is when someone encrypted a network traffic in the protocol used DNS. However, this is not an everyday . This type of operation orchestrated by hackers. Individuals want to bypass controls put in to safeguard a network.

According to some specialist. is technically possible to free data using DNS tunneling on the MTN network. The specialist continues and eventually not be a remarkably fast connection because of the limitation of the DNS protocol.

Nevertheless, Internet security analyst noticed that connections to MTN’s DNS servers reset often. It’s a move any doubt”, put as a countermeasure to interrupting persistent connections, on the network.

Nonetheless, is possibility to reach MTN’s root DNS servers even if you no airtime or data, the researcher added.

Besides the existant vulnerability presented by DNS tunneling, the cybersecurity specialist does other issues the captive portal that is displayed when you run out of data and airtime.
Crucially, the page does not a security certificate at all. The reason for is the IP address of the MTN No Funds ( is equally associating several other MTN .

This bridge in the network exploited by phishing scams with low Hacking skill easy.

Why MTN is resisting under attack ?
It’s is to know that “DNS tunneling is just one of many of cyber attacks that operators face on a constant basis,” executive for corporate affairs at MTN Jacqui O’Sullivan in an interview

“MTN is monitoring any potential security attacks or bypass mechanisms, and built-in protocols to such attacks.”

O’Sullivan MTN aware of the exploit identified by the researcher, as as the older example provided in report the vulnerabilities discovered. “In both instances measures we’re putting in to limit MTN’s exposure,” O’Sullivan said.

“MTN proactively manages this environment and because the attempted attacks are constantly changing, we on identifying the abuse and then implementing the necessary controls.”

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.