
More MikroTik Routers and Switches Cons » They only provide a warranty for one year as compared to the other vendors who offer a warranty for three years, five years, and lifetime, etc." I have a lot of clients that have spam on their networks." "They lack the extended warranty for the equipment.
#Mikrotik routing license
One is in a standby state while the other is active, and if one fails then the other takes over." "They need to create a license for IBS. It can also be more stable and scalable." "The biggest thing that needs improvement is the support." "I would like to see a cluster feature added, where multiple devices can be configured and managed as one. The configuration can take a lot of time." "The solution needs to improve its security firewalls and mirror that of, for example, Sophos, or FortiGate." "Technical support could be better. However, if I go to a third party's website, I can easily find the information." "The initial setup can be a bit difficult. When I go to it, I can't find what I'm looking for. Up to 200,000 routers had been enslaved at the time of discovery and were being forced to mine for Monero by way of the Coinhive script."The solution's website isn't that good. The majority of victims come from Russia, followed by Brazil, Indonesia, India, and Iran.ĭue to the researchers' findings, one of the attacker IPs, 103.193.137.211, has now been suspended and is no longer a threat.īack in August, it was discovered that MikroTik routers were being compromised as part of a massive cryptojacking campaign. "Are they trying to monitor and capture some special users' network snmp community strings? We don't have an answer at this point, but we would be very interested to know what the answer might be." "This deserve some questions, why the attacker is paying attention to the network management protocol regular users barely use?," 360 Netlab commented. "The MikroTik RouterOS device allows users to capture packets on the router and forward the captured network traffic to the specified Stream server," the researcher said, adding that ports 20, 21, 25, 110, and 143 appear to be of the most interest to the eavesdroppers. TechRepublic: Why router-based attacks could be the next big trend in cybersecurity However, the attacker's own proxy ACLs block the script from operating. The attacker also continues to scan more MikroTik RouterOS devices by using these compromised Socks4 proxies."ģ60 Netlab added while it is not known why this tampering has taken place, the researchers believe it is "something significant."Īll proxy requests in the impacted devices are also redirected to a local HTTP error page which the cybercriminals hoped would enable the launch of a Coinhive mining script, used to mine Monero. "In order for the attacker to gain control even after device reboot (IP change), the device is configured to run a scheduled task to periodically report its latest IP address by accessing a specific attacker's URL. "The Socks4 port is mostly TCP/4153, and very interestingly, the Socks4 proxy config only allows access from one single net-block 95.154.216.128/25," the researchers say. In total, over 7,500 routers are directly forwarding user data, while 239,000 have had their Socks4 proxies covertly enabled. The team has been picking up active exploits of a number of these routers since mid-July through a honeypot system. See also: This malware disguises itself as bank security to raid your account Researchers from 360 Netlab say that out of over five million devices with an open TCP/8291 port online, 1.2 million are MikroTik routers - of which, 370,000 devices remain unpatched against CVE-2018-14847.

While patched in August, which prevents threat actors from reading or exfiltrating data passed through the router, many models remain vulnerable. Version 6.42 of the OS "allows remote attackers to bypass authentication and read arbitrary files by modifying a request to change one byte related to a Session ID," according to NIST. The vulnerability is present in Winbox, an administration utility in the MikroTik RouterOS which also offers a GUI for router configuration.


The routers have been hijacked through the CVE-2018-14847 security vulnerability, a known bug which impacts the MikroTik RouterOS operating system.
#Mikrotik routing Patch
Microsoft Patch Tuesday: 55 bugs squashed, two under active exploit.Average ransomware payment for US victims more than $6 million.Exchange Server bug: Patch immediately, warns Microsoft.Costco customers complain of fraudulent charges, company confirms card skimming attack.This malware could threaten millions of routers and IoT devices.
#Mikrotik routing windows 10
