Massive MikroTik router botnet has been spreading malware – here’s how to stay safe
Misconfigured routers have been hijacked to act as proxies
The most popular brand of router in Russia, MikroTek, has been compromised by cybercriminals with links to Russia in order to send spoofed emails and deliver trojan malware. Infoblox researchers have discovered a large-scale botnet operation that turns misconfigured routers into zombie botnets, with at least 13,000 compromised routers acting as proxies for the malware.
The hackers chose servers with DNS misconfigurations, then spoofed spam using a massive network of relays – this being the 13,000 compromised routers configured as SOCKS proxies. When a compromised proxy forwards traffic without checking the origin, the recipient can’t check to see if it’s coming from an original source so malicious emails seem to originate from legitimate domains and are able to bypass protections.
When email domain settings are configured correctly, a user sends an email and the receiving mail server checks the Sender Policy Framework (SPF) record to verify that the message is coming from an authorized server. If the email fails this check, it’s likely to be marked as spam or rejected, explains researchers at Infoblox.
A misconfiguration in the SPF allowed threat actors to place a script onto the devices to allow them to operate as TCP redirectors. “Enabling SOCKS effectively turns each device into a proxy, masking the true origin of malicious traffic and making it harder to trace back to the source.” The malware emails contained fake invoices and included a zip file containing a malicious payload; the attached trojan communicated to a command and control server that was previously related to suspicious Russian activity.
The malicious emails are designed to look like legitimate domains but can also be used for many other nefarious purposes – more concerning is that because the botnet lacks authentication, the entire botnet or the individual devices are all open for exploitation from other hackers or threat actors.
It is not clear at this time how the routers themselves were compromised, and though critical vulnerabilities have been identified in the past, recent firmware releases may have also contributed to the misconfigurations. In total, it is thought that the campaign may involve as many as 20,000 sender domains (web servers’ names). For scale, the Tor network uses around 8,000 relays making this botnet more than 1.5 times larger.
Infoblox threat researcher David Brunsdon said that “Together, they form a large cannon, poised and ready to unleash a barrage of malicious activities.” And the Infoblox report details that “Tens or hundreds of thousands of compromised machines use them for network access, significantly amplifying the potential scale and impact of the botnet’s operations.”
Sign up to get the BEST of Tom's Guide direct to your inbox.
Get instant access to breaking news, the hottest reviews, great deals and helpful tips.
Similar botnets have participated in a wide range of malicious behavior including DDoS attacks, spam and phishing campaigns, credential stuffing attacks, data theft, cryptojacking, click fraud and more.
How to stay safe
Obviously the first step to staying safe is to make sure your router is properly configured, and kept up to date. If it's on the older side, you might be better off just upgrading to one of the best Wi-Fi routers as many newer devices ship with built-in security software.
Never open email attachments that you're not expecting or ones that come from a sender that you don't know. This also applies to links in emails too.
As an added step, make sure you have a strong, robust antivirus software installed on your home PC and laptop. It's never a bad idea to make sure that your antivirus suite includes a VPN and a hardened browser too.
More from Tom's Guide
- US government agencies spent taxpayer money to buy your location data
- LinkedIn is scraping your data to train AI — here’s how to opt-out
- 2.9 billion hit in one of the largest data breaches ever — full names, addresses and SSNs exposed
Amber Bouman is the senior security editor at Tom's Guide where she writes about antivirus software, home security, identity theft and more. She has long had an interest in personal security, both online and off, and also has an appreciation for martial arts and edged weapons. With over two decades of experience working in tech journalism, Amber has written for a number of publications including PC World, Maximum PC, Tech Hive, and Engadget covering everything from smartphones to smart breast pumps.