Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Communications Privacy Wireless Networking

MikroTik Routers Are Forwarding Owners' Traffic To Unknown Attackers (bleepingcomputer.com) 31

Attackers have been exploiting vulnerabilities in MikroTik routers to forward network traffic to a handful of IP addresses under their control. "The bug is in Winbox management component and allows a remote attacker to bypass authentication and read arbitrary files," reports Bleeping Computer. "Exploit code is freely available from at least three sources from at least three sources." From the report: 360Netlab announced in a blog post today that more than 7,500 MikroTik routers across the world are currently delivering their TZSP (TaZmen Sniffer Protocol) traffic to nine external IP addresses. According to the researchers, the attacker modified the device's packet sniffing settings to forward the data to their locations. "37.1.207.114 is the top player among all the attackers. A significant number of devices have their traffic going to this destination," Qihoo experts inform.

The analysis shows that the attacker is particularly interested in ports 20, 21, 25, 110, and 144, which are for FTP-data, FTP, SMTP, POP3, and IMAP traffic. An unusual interest is in traffic from SNMP (Simple Network Management Protocol) ports 161 and 162, which researchers cannot explain at the moment. The largest number of compromised devices, 1,628, is in Russia, followed by Iran (637), Brazil (615), India (594) and Ukraine (544). The researchers say that security outfits in the affected countries can contact them at netlab[at]360.cn for a full list of IPs.

This discussion has been archived. No new comments can be posted.

MikroTik Routers Are Forwarding Owners' Traffic To Unknown Attackers

Comments Filter:
  • by Anonymous Coward

    have you inspected the source code? No, so do not use them. Just put your PC on the internet and use hosts files protection from /.

    • by Anonymous Coward

      Install Openwrt firmware instead

      Check if your router is compatible with openwrt first

      Openwrt.org

    • by xQx ( 5744 )

      Right.

      Because Cisco let you inspect their source code, and your traffic would NEVER pass through one of those routers.

  • I don't use Winbox.

  • by llamalad ( 12917 )

    So they're targeting the non-SSL versions of services.

    And SNMP being included is somehow a mystery? If you were the sort who wanted illicit access to people's systems, networks, and communications why wouldn't you want to also catch their SNMP strings? It's notoriously insecure yet shockingly common; a great way to dig deeper into a compromised site.

    • Re:Lol (Score:4, Informative)

      by viperidaenz ( 2515578 ) on Tuesday September 04, 2018 @08:05PM (#57253704)

      For someone in the security community to not know the significance of sniffing SNMP traffic is quite sad.
      Having the community strings would give an attacker the ability to map out every device on the entire network. In some cases the right community strings would give them access to change the configuration of the routers, firewalls and switches on the network. SNMP v1 and v2 are not secure.

  • Is as a raw device with something like OpenWRT or other customized firmware

  • by TheDarkener ( 198348 ) on Tuesday September 04, 2018 @08:50PM (#57253870) Homepage

    The analysis shows that the attacker is particularly interested in ports 20, 21, 25, 110, and 144, which are for FTP-data, FTP, SMTP, POP3, and IMAP traffic

    Uhh, that's 143 for IMAP. 144 is for "NewS window system" or "Universal Management Architecture".

  • Patched in April (Score:5, Informative)

    by pradeepsekar ( 793666 ) on Wednesday September 05, 2018 @02:06AM (#57254884)

    Patches were released by Mikrotik in April. The upgrades are easy - just a few mouse clicks. Configuring automatic upgrades is also easy. Out of the box, the routers come with a secure WAN configuration.

    Given this scenario, if users do not upgrade their router for a significant period of time, and/or configure the routers in a insecure manner, I would not apportion much blame on the supplier.

    All routers have had vulnerabilities. The question is how quickly the manufacturer fixes them, if the vulnerabilities were a result of malice or incompetence, is what I would use to judge the manufacturers. And Mikrotik would get one of the top ranks on these parameters. The article does not bring out these details.

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...