Would have been nice with a better hardened default config out of the box.
Such as…?
If that includes a wish that the recent policy of random default passwords started much earlier, then I agree. But, go read all the threads here moaning about how terrible a burden it was when it finally did land.
(And it doesn't help that MT's stance was "the EU made us do this!" It shouldn't've taken continent-scale legislation to get this done.)
An LTS update service option would be nice, not so much for "stability" per se but because it would let people turn on auto-updates and not worry about it. I shouldn't have to be put at risk of downtime due to new features if I wasn't going to use those new features in the first place. Currently, opting out of unnecessary feature updates means no bug fixes after the last point release comes out.
But on the other hand admins exposing the mgmt-interface towards the internet is hard to beat other than with education
A Shodan search for "RouterOS" pulls up 1.15M boxes exposing something that reveals this detail, even though the stock WAN-side "input" firewall is fully blocked off. 9/10 of the first-page search results are currently SNMP, with the 10th being a public-facing Webfig instance. Why the entire Internet needs to see your SNMP is an unfathomable mystery to me. The Webfig thing I can at least understand, if not support.
BCP38
The attacker gains little from protecting their ill-gotten resource with source IP spoofing. There's plenty more zombie boxes to be had. By keeping the legitimate source IP, the compromised host's ISP may not even realize they're hosting an attack bot.
I'm not arguing against such filtering. Obviously it should be done. I merely question how much doing that would've helped in this immediate incident.
One could argue what does a bandwidth testing tool do in a switch or a router?
I mean removing that would make it much harder to generate traffic from an overtaken Mikrotik box?
Not really. Between things like containers, MITM methods, CA cert misuse…getting root on a core router opens a tremendous amount of powerful attack opportunities. Having a bandwidth test tool available isn't the key problem; it was merely the biggest sledgehammer immediately at hand once the bad guys got in.