Automating email verification process
The researchers signed up for hundreds of cloud services by automating the email verification process. After registering their mail accounts, they had control over hundreds of virtual machines that could be used as a botnet for massive port scanning and crypto currency mining.
The researchers wanted to demonstrate what would happen if criminals use free cloud services for illegal activities. Salazar and Ragan presented their findings in their presentation ‘Cloud Ninja: Catch Me If You Can’ during the RSA Conference in San Francisco.
They could abuse two-thirds of the 150 cloud services available. Amazon has secured its cloud service by implementing strong authentication through SMS. The researchers advise the other cloud services to follow Amazon’s example.
Companies are always looking for the best way to reach their consumers and the rise of mobile technology offers them new opportunities to achieve this goal.
In addition to various messaging services, the platform also provides solutions for calling through SIP trunking, SMS Analytics for companies, phone number validation and online identification solutions such as two-factor authentication (2FA).
We offer a hybrid solution for companies to reach their target audience, anytime and anywhere.