Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » 13,000 MikroTik routers hijacked by botnet due to spam and cyber attacks
Global Security

13,000 MikroTik routers hijacked by botnet due to spam and cyber attacks

AdminBy AdminJanuary 21, 2025No Comments3 Mins Read
MikroTik Routers Hijacked
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 21, 2025Ravi LakshmananEmail Security / Botnet

MikroTik routers are hacked

A global network of around 13,000 compromised Mikrotik routers has been used as a botnet to spread malware through spam campaigns, latest addition to a list of botnets works on MikroTik devices.

Infoblox Security Researcher David Brunsdon: The activity “takes advantage of misconfigured DNS records to communicate email protection techniques. said in a technical report published last week. “This botnet uses Mikrotik’s global network of routers to send malicious emails that appear to originate from legitimate domains.”

The DNS security company that gave the company its code name Microprinting errorsaid his analysis was based on the detection in late November 2024. of a malicious spam campaign that used invoice-related lures to trick recipients into running a ZIP archive payload.

Cyber ​​security

The ZIP file contains an obfuscated JavaScript file, which is then responsible for running a PowerShell script designed to initiate an outbound connection to the management server (C2) located at IP address 62.133.60(.)137.

The exact initial access vector used to infiltrate the router is unknown, but various firmware versions were affected, including those vulnerable to CVE-2023-30799a critical elevation of privilege issue that can be abused to execute arbitrary code.

“Regardless of how they were compromised, it appears that the actor placed a script on the (Mikrotik) devices that includes SOCKS (Secure Sockets), which allow the devices to act as TCP redirectors,” Brunsdon said.

“Enabling SOCKS effectively turns each device into a proxy server, masking the true origin of malicious traffic and making it difficult to trace back to its source.”

Adding to the concern is the lack of authentication required to use these proxies, allowing other threat actors to use specific devices or the entire botnet for malicious purposes ranging from distributed denial of service (DDoS) attacks to phishing campaigns.

The spam company in question was found to be using a misconfiguration as part of the sender’s policy (SPF) TXT records of 20,000 domains, giving attackers the ability to send emails on behalf of those domains and bypass various email protection tools.

Cyber ​​security

In particular, SPF entries were found to be configured with the extremely permissive “+all” option, which essentially defeats the purpose of the protection. This also means that any device, such as compromised MikroTik routers, can spoof a legitimate domain in an email.

MikroTik device owners are advised to constantly update their routers and change their default credentials to prevent any exploit attempts.

“With so many MikroTik devices compromised, the botnet is capable of launching a wide range of malicious activities, from DDoS attacks to data theft and phishing campaigns,” Brunsdon said. “The use of SOCKS4 proxies further complicates detection and mitigation efforts, highlighting the need for robust security measures.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.