MTN Security Challenge. Why this company to deal with notorious hackers trying to steal data them? reason is are .

Because according to various cybersecurity researcher group report. is a vulnerability backdoor in MTN network. Allows experienced hackers to data using DNS tunneling hacking .

that Name System (DNS) is a group servers on Internet. enable the humanly readable domains. as as an example into what we an Internet Protocol addresses.

Tunneling hacking skills refer to an intelligent practice a hacker routing traffic. a port or a  protocol, does usually travel .

This practice of tunneling hacking is somehow legal at a certain . Because this the exact Private , VPN do to secure data and limited Internet .

How does the DNS tunneling work?

The DNS tunneling is like when encrypted a in the protocol used DNS. However, this is an everyday activity. This type of operation usually orchestrated by hackers. who want to bypass controls put in to safeguard a network.

According to specialist. is technically to free data using DNS tunneling on the MTN network. The specialist continues and said eventually will be a remarkably fast because of the limitation of the DNS protocol.

Nevertheless, Internet security analyst noticed that connections to MTN’s DNS servers reset often. It’s a safety move without any doubt”, put as a countermeasure to interrupting persistent connections, on the network.

Nonetheless, is another to MTN’s root DNS servers if have no airtime or data, the researcher added.

Besides the existant vulnerability presented by DNS tunneling, the cybersecurity specialist does other issues with the captive portal that is displayed when run out of data and airtime.
Crucially, the page does not have a security certificate at all. The reason for is the IP address of the MTN No Funds ( is equally associating with several other MTN domains.

This open bridge in the network could exploited by phishing scams with low Hacking skill .

Why MTN is resisting attack ?
It’s is important to know that “DNS tunneling is just one of of cyber attacks that operators face on a constant basis,” executive for affairs at MTN Jacqui O’Sullivan said in an interview

“MTN is any potential security attacks or bypass mechanisms, and built-in protocols to manage attacks.”

O’Sullivan said MTN aware of the exploit identified by the researcher, as well as the example they provided in their report the vulnerabilities they discovered. “In both instances measures we’re putting in to limit MTN’s ,” O’Sullivan said.

“MTN proactively manages this environment and because the attempted attacks are constantly changing, we on identifying the abuse and implementing the necessary controls.”