News

Over 300,000 MikroTik routers are vulnerable to hacking

Researchers from Eclypsium stated that more than 300,000 routers of the Latvian company MikroTik are vulnerable to hacking by remote attacks. Because of them, devices can become members of botnets that steal confidential user data and participate in DDoS attacks.

Experts write that most of the vulnerable devices are located in China, Brazil, Russia, Italy and Indonesia.

Microtik Devices

These devices are powerful [and] often very vulnerable. This has made MikroTik devices a favorite among attackers who use them for everything from DDoS attacks and C&C to traffic tunneling and more.the report says.

Researchers also remind that in the fall of this year, one of the most powerful DDoS attacks in history, perpetrated by the Mēris botnet, was also carried out using MikroTik devices.

The essence of the Eclypsium report boils down to the fact that administrators are often in no hurry to install patches for their MikroTik devices, which is why many of them are still vulnerable to dangerous remote attacks, although patches have been available for a long time. So, experts list the following vulnerabilities dated 2018 and 2019, which are often exploited by cybercriminals:

  1. CVE-2019-3977 (CVSS score: 7.5) – MikroTik RouterOS incorrectly validates the origin of service packs, thus resetting all usernames and passwords;
  2. CVE-2019-3978 (CVSS score: 7.5) – MikroTik RouterOS does not sufficiently protect a critical resource, which may lead to cache poisoning;
  3. CVE-2018-14847 (CVSS score: 9.1) – MikroTik RouterOS directory traversal vulnerability in WinBox interface;
  4. CVE-2018-7445 (CVSS Score: 9.8) – MikroTik RouterOS SMB Buffer Overflow Vulnerability.

After scanning the Internet, Eclypsium experts discovered about 300,000 MikroTik routers that are vulnerable to at least one of the vulnerabilities listed above. Also, experts say that they were able to identify about 20,000 unprotected MikroTik devices that injected mining scripts on all web pages visited by users.

Top Crypto Mining Scripts

The ability of compromised routers to inject malicious content, tunnel, copy or redirect traffic can be exploited in many very dangerous ways. DNS poisoning can redirect a remote worker’s connection to a malicious site or carry out a machine-the-middle attack.

MikroTik representatives have already reacted to the publication of the report, and write that there are no vulnerabilities in the latest version of RouterOS, and router administrators should install updates and patches in a timely manner, and take precautions:

  1. do not open access to your device via the Internet for everyone;
  2. use strong passwords;
  3. do not trust the local network;
  4. block domains and endpoints associated with the Meris botnet;
  5. check the RouterOS configuration for unknown settings.
It is worth noting that in addition to the report, Eclypsium specialists have released a free tool with which it is possible to determine whether a MikroTik device is vulnerable, whether it has been attacked or infected.

Recall that we also wrote that Microsoft Azure platform hit by 2.4 TB / sec DDoS attack also using the Mēris botnet.

Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Sending

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button