2 Comments
User's avatar
S Russell's avatar

Always learn something new and useful in every article you publish. Thanks

Just one question though:

If these tools are able to locate and count how many compromised routers are being exploited, what ISPs are involved, and what their geographical locations are, shouldn't these ISPs themselves be able to easily determine and potentially fix those exploits?

Just curious

Jackie Singh's avatar

I addressed this in the story because I imagined it might come up in the mind of the reader:

"This pattern repeats across dozens of legitimate services: Mailchimp, Amazon SES, SendGrid, Google Forms, Bit.ly, and others have all been abused for phishing by actors violating their Terms of Service because they are designed to be trusted, useful, and legitimate.

It is also true that some companies fail to apply sufficient resources towards keeping their platforms safe in a manner that is commensurate to the scale of the problem.

Many of those would argue they do the best they can under difficult circumstances."

Cheers!