Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Innumerable Mikrotik Routers contract Crypto-Jacking Malware


Security researchers recently found 415,000-and-more routers, especially MikroTik routers, as contaminated with malicious software created for seizing the connected PCs' computing power for use in clandestine mining of crypto-currency. It's said the last few months of ongoing crypto-jacking assaults against the MikroTik model started from August. At that time security researchers found 200,000-and-more devices as contaminated. The figure since then has increased twofold and more.

One fresh map of threat detection shows that at the beginning of the assaults the greater number of hijacked devices was mostly inside Brazil. However, with the expansion of the contamination attack, routers inside Europe, Africa, South America, North America, Asia and the Middle East are getting impacted. Essentially the sale of MikroTik routers is to organizations and Internet Service Providers, with the hike in such devices' contaminations indicating that the larger number of organizations hadn't adopted router firmware of the most recent kind. www.digitaltrends.com posted this, December 4, 2018.

The attackers via exploitation of vulnerability inside the previous editions of firmware of MikroTik managed inserting a Coinhive code into all the web-pages end-users visited. From editions OS to 6.42 of MikroTik router, all let illegitimate remote attackers scan and interpret arbitrary files while let legitimate remote attackers type content of arbitrary files. This was possible by exploiting a security flaw of 'directory traversal' inside WinBox interface. Although at first, Coinhive was recognized as lawful software for letting online sites to use the site visitors' hardware for sometime for mining Monero; actually the code's exploitation has enabled AV programs to disable the Coinhive.

Further while mining of crypto-currency has reached the peak and exploded causing too many graphic cards accumulated during the crypto peak, still crypto-jacking is one severe security threat. Luckily during crypto-jacking assaults, there's no compromise of personal information stored or transferred from one point to another of the network. The main purpose of crypto-jacking attackers is gaining devices' computing power for mining digital coins.

However according to Troy Mursch, security expert associated with Bad Packets Report, people owning vulnerable MikroTik devices should best take down the most current firmware edition to load onto their routers immediately.

» SPAMfighter News - 12/11/2018

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next