When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Speaking toBleepingComputer, The Shadowserver Foundation said that the attack recently increased in intensity.
The whole process is automated, making it possible on a grander scale.
The automation part is made possible through malware.
Usually, the devices used in the attack are part of a botnet, or a residential proxy service.
Residential proxies are IP addresses assigned to real devices by internet service providers (ISPs).