When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Speaking toBleepingComputer, The Shadowserver Foundation said that the attack recently increased in intensity.

The whole process is automated, making it possible on a grander scale.

Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol

The automation part is made possible through malware.

Usually, the devices used in the attack are part of a botnet, or a residential proxy service.

Residential proxies are IP addresses assigned to real devices by internet service providers (ISPs).