Pull to refresh
57
0
Олег @Lifz

Пользователь

Send message

Заявление от MikroTik:

Many of you have asked, what is this Mēris botnet that some news outlets are discussing right now, and if there is any new vulnerability in RouterOS.

As far as we have seen, these attacks use the same routers that were compromised in 2018, when MikroTik RouterOS had a vulnerability, that was quickly patched.

Unfortunately, closing the vulnerability does not immediately protect these routers. If somebody got your password in 2018, just an upgrade will not help. You must also change password, re-check your firewall if it does not allow remote access to unknown parties, and look for scripts that you did not create.

We have tried to reach all users of RouterOS about this, but many of them have never been in contact with MikroTik and are not actively monitoring their devices. We are working on other solutions too.

As far as we know right now - There are no new vulnerabilities in these devices. RouterOS has been recently independently audited by several contractors.

If you do see a RouterOS device that has malicious scripts or SOCKS configuration that was not created by you, especially if this configuration APPEARED NOW, RECENTLY, WHILE RUNNING A NEW ROUTEROS RELEASE: Please contact us immediately.

More specifically, we suggest to disable SOCKS and look in the System -> Scheduler menu. Disable all rules you can't identify. By default, there should be no Scheduler rules, and SOCKS should be off.

Официальное заявление от MikroTik:

A cybersecurity researcher from Tenable Research has released a new proof-of-concept (PoC) RCE attack for an old directory traversal vulnerability that was found and patched within a day of its discovery in April this year, the new attack method found by Tenable Research exploits the same vulnerability, but takes it to one step ahead.

Since the original Winbox issue, identified as CVE-2018-14847, was already patched back in April, we urge all MikroTik users to upgrade their devices to any recently released version, and as a precaution also change their passwords and inspect their configuration for unknown entries.

Please note that all of the recently released CVE entries have been fixed in RouterOS for several months, none of the newly discussed issues affect current products. More information from Tenable. Original post about the fixed issue, later called CVE-2018-14847, including more suggestions.

In short:

Regardless of version used, all RouterOS versions that have the default firewall enabled, are not vulnerable
If user has manually disabled the default firewall, their device might be vulnerable to CVE-2018-14847, which was patched in April
Newly revealed exploit relies on the above, already patched issue
Please upgrade, change password and inspect configuration for irregularities
iOS 7 из 10 — учитывая что я не программист и с разработкой софта вообще дел не имею.
В 99.9% случаев в заражении роутера виноваты сами пользователи. Либо напрочь сносят фаервол, либо открывают полный доступ из вне.

— работаю в MT.
Тоже 28 числа получил подобный майл. Сменил пароль, и вот буквально в ночь с 6 на 7 ноября, с моего акканунта полетели два спам твита. Как потом выяснил пароль утек с помощью приложения на FB, которое делает перепост твитов в FB.
Хотелось бы полную водостойкость, хотя бы на 0,2-03 bar.
Жаль, что ограничились лишь Германией. В Прибалтике ярых сторонников неонацистов тоже хватает.
Мне недавно прислали мыло с текстом.
Бла, бла, бла — извиняемся, но мы не можем вам выслать диск, но вы можете скачать архив по такой то ссылке.

“Download a copy of your Facebook data” at the link below:

https://www.facebook.com/settings"
Забыли добавить Canon 500d
Идея не нова, но бесспорно интересна. Печалит лишь то, что в обозримом будущем человки все больше будут зависеть от подобных программ :( имхо.
А что, хорошими поступками прославиться нельзя?
Перезалейте пожалуйста ролик на Youtube, канал с Китаем уж очень тормозит.
[14:28:17] Олег [Lifz]: алелуя)
[14:28:39] Олег [Lifz]: и в чем же проблема была?
[14:28:44] человек из скайпа: да пид****ы
[14:28:49] человек из скайпа: на те же грабли
Самое смешное, что сами работники скайпа пока не вкурсах в чем проблема.
Общаюсь сейчас с одним через фбовский чат, толком не чего сказать не может.
Помню в детстве было что то похожое. Хотя уже тогда брались нитки/резинки, электро моторчики.
Забавно наблюдать за проделками анонимусов ))

Information

Rating
Does not participate
Location
Латвия
Registered
Activity