Blog
Dive deep into MikroTik's RouterBoards and RouterOS. We keep you informed and up-to-date, always.
Blog
Dive deep into MikroTik's RouterBoards and RouterOS. We keep you informed and up-to-date, always.
Author
Every post is penned by our certified MikroTik engineers, ensuring relevance and accuracy in every word.
Feedback
Your insights drive our content. Sharing knowledge, we elevate the MikroTik community in Canada together.
Cybersecurity: Can't Ever Have Enough!
Online security is probably as old as the internet itself.
Given our never-ceasing online presence and the fact that all aspects life, from entertainment to social life to education to business, are virtually intertwined one way or another, we cannot stress enough the significance of up-to-date and robust security measures.
Botnet, that All-Too-Familiar Name...
While it would be a lot cooler to approach this topic in more of a James Bond-Jason Bourne-Jack Bauer style (three super spies with JB initials; coincidence?!), maintaining network security should be a much more patient and consistent process.
Botnets, named after their general structure of a Robot Network, have proven the continuous nature of online security. Since 2003 with MaXiTE as their pioneer, botnets have tested the security of millions of networks globally.
Hackers utilize botnets to cause a range of headaches, from direct malignant activities like data theft to using your computer's capacity in other destructive or even criminal activities. They may even sell their botnets to other hackers.
What can I do to secure a device or network?
With a few basic and simple preventative measures, you can remain on the safe side.
Been There, Done That...
We did an article on a rogue botnet back in August 2018 that was exploiting a vulnerability in WinBox that was patched in RouterOS v6.42.1. Back then, all RouterOS versions 6.29 to 6.42 were threatened.
How to find if your router is compromised?
Check your Router's SOCKS service first. If you have never used a SOCKS service on your router, make sure it is disabled. If not, this means your router has been compromised.
SOCKS is a proxy server that allows the relay of TCP-based application data across a firewall, even if the firewall is set to block packets. The SOCKS protocol is independent of application protocols and can be used for many services, e.g., WWW, FTP, TELNET, and others.
Remove all unwanted the scripts. Check all files and folders for mikrotik.php and delete it. The scripting host helps automate some router maintenance tasks through user-defined scripts bounded to event occurrences.
Scripts can be stored in the Script Repository or written directly to the console. Some events used to trigger script execution include, but are not limited to, the events generated by System Scheduler, Traffic Monitoring Tool, and Netwatch Tool.
Similar to scripts, scheduled events can also be a sign of possible breaches. Check to see if you have any schedules that you do not recognize, and remove them.
Hackers and malicious software can use the scheduler tools of RouterOS to relay unwanted traffic, accumulate data, or gather periodical information from your device in order to stay up to date concerning any changes in your configuration.
What to do if my device or network has been compromised?
In case you ever suspect a network breach, do as below:
For further information concerning the security of your device, you can refer to MikroTik's Wiki on how to secure your router.
MikroTik News
Join the first-ever free MikroTik MTCNA training in Canada! Watch the full course online, get certified, and kickstart your networking career—100% free.
Join the first-ever free MikroTik MTCNA training in Canada! Watch the full course online, get certified, and kickstart your networking career—100% free.