HI,
Normis, before you close this topic, im not interested in how they got in, but what they want.
As seen in topic viewtopic.php?f=9&t=137217 the past few days a vast number of non-up-to-date Mikrotik devices has been compromised.
(not blaming Mikrotik, we should have updated)
Like Normis stated at the last post, the hacker could have collected passwords way before hand and used them now.
We took the action to remove scripts, schedulers and disable IP>Socks, then use firewall filter to block all incoming WAN traffic from non-whitelisted sources and updated to 6.40.8.
I know that a clean Netinstall would be the best course of action, but we have devices spread over the whole of Europe, so that's easier said than done.
But i am wondering, what was the goal of this?
This is what i have found (not an hacking expert)
- Scheduler is used to run a script every 30 seconds
- Script is used to fetch mikrotik.php from several IP addresses
- There are different versions of the hack, or several steps, mostly i found script3_ under scripts, but i have also found script1_ in one occasion.
(deleted it, without proper examination.... sorry panic mode )
- The source where mikrotik.php was downloaded has gone, so no way to see what was in the mikrotik.php file.
- IP > Socks is set to enabled on port 4145
[edit] - All drop rules in firewall filters have been disabled
Thats all we found, anybody got anything else that we have missed?
So if they already had the login credentials, then what did they do with mikrotik.php?
And did it infect the device on a shell level? (does upgrading fix that if that would be the case)
Since taking above said steps, i have not noticed any strange behavior, but it has only been 24h.
Did anybody get further in what has exactly been changed in the devices?
Br,
Ammer