Researchers say a medium severity bug should now be rated critical because of a new hack technique that allows for remote code execution on MikroTik edge and consumer routers. A new hacking technique ...
According to Trustwave researcher Simon Kenin, on July 31, a surge in Coinhive activity was detected which indicated that a malicious cryptocurrency mining operation was underway. In a blog post, the ...
Hacker Using MikroTik Routers to Eavesdrop on Internet Traffic The hacker has been actively forwarding the network traffic from over 7,500 vulnerable MikroTik routers around the globe, but the ...
The powerful devices leveraged by the Meris botnet have weaknesses that make them easy to exploit, yet complex for organizations to track and secure, researchers said. The routers leveraged by the ...
Up to 900,00 MikroTik routers — a popular target for threat actors including nation-state groups — may be open to attack via a privilege escalation vulnerability in the RouterOS operating system. The ...
Tens of thousands of MikroTik and Ubiquiti routers are currently available online, featuring alarmistic hostnames such as "HACKED FTP server," "HACKED-ROUTER-HELP-SOS-WAS-MFWORM-INFECTED," or ...
In March, routers from Latvian manufacturer MikroTik were hit by an advanced threat dubbed Operation Slingshot. The company patched for the threat, but now a new cryptomining attack has hit MikroTik ...
200K MikroTik Routers Exploited to Serve Cryptocurrency Miner The hacker has been using a security flaw in MikroTik routers to secretly slip a cryptocurrency miner into computers that connect to them.
In yet another case of unpatched consumer devices representing a threat to the security and privacy of users, thousands of MikroTik have been uncovered which are eavesdropping on users. The routers ...