Coinhive Cryptojacking Hits 200K+ MikroTik Routers

By   ISBuzz Team
Writer , Information Security Buzz | Aug 07, 2018 06:25 am PST

In response to the news that over 200,000 MikroTik routers have been hit by a Coinhive cryptojacking campaign, an expert with Corero Network Security offers thoughts.

Sean Newman, Director Product Management at Corero Network Security:

“The recent infection of over 200,000 MikroTik routers is another prime example of how easy life can be for bad actors to be successful with their nefarious activities.  And, in this case, we’re not talking about cheap IoT devices with vulnerabilities which are never addressed by the vendor.  This is another example of an exploit leveraging a vulnerability that was rapidly fixed, in a new software release from the vendor, but most deployed devices remain vulnerable as their owners have not been aware of, or able to carry out, the upgrade.

In this case, the routers were exploited to deliver a crypto-mining payload but, the same approach could have just as easily leveraged them for other objectives, including data exfiltration or DDoS attacks.  From a DDoS perspective, the scale of processing power available in such devices could easily be leveraged for a single attack which could extend to tens of terabits per second, or many smaller attacks if they were used as part of a DDoS for hire service.

The challenge of unpatched devices is a hard one for the equipment vendors to solve, especially as, in many cases, they don’t actually know who the end-users are, so cannot reach out to them directly and notify them of critical software updates.  This evolving pool of Internet-connected devices, easily exploited by cybercriminals, is a key reason why organizations need to ensure they are deploying the latest cyber-security defences, whether that’s detecting crypto-jacking within their network or being able to defend from crippling DDoS attacks, in real-time.”

Notify of
0 Expert Comments
Inline Feedbacks
View all comments

Recent Posts

Would love your thoughts, please comment.x