Massive MikroTik router botnet has been spreading malware – here’s how to stay safe

A Wi-Fi router next to a phone with a lock symbol on the screen
(Image credit: Shutterstock)

The most popular brand of router in Russia, MikroTek, has been compromised by cybercriminals with links to Russia in order to send spoofed emails and deliver trojan malware. Infoblox researchers have discovered a large-scale botnet operation that turns misconfigured routers into zombie botnets, with at least 13,000 compromised routers acting as proxies for the malware.

The hackers chose servers with DNS misconfigurations, then spoofed spam using a massive network of relays – this being the 13,000 compromised routers configured as SOCKS proxies. When a compromised proxy forwards traffic without checking the origin, the recipient can’t check to see if it’s coming from an original source so malicious emails seem to originate from legitimate domains and are able to bypass protections.

When email domain settings are configured correctly, a user sends an email and the receiving mail server checks the Sender Policy Framework (SPF) record to verify that the message is coming from an authorized server. If the email fails this check, it’s likely to be marked as spam or rejected, explains researchers at Infoblox.

A misconfiguration in the SPF allowed threat actors to place a script onto the devices to allow them to operate as TCP redirectors. “Enabling SOCKS effectively turns each device into a proxy, masking the true origin of malicious traffic and making it harder to trace back to the source.” The malware emails contained fake invoices and included a zip file containing a malicious payload; the attached trojan communicated to a command and control server that was previously related to suspicious Russian activity.

The malicious emails are designed to look like legitimate domains but can also be used for many other nefarious purposes – more concerning is that because the botnet lacks authentication, the entire botnet or the individual devices are all open for exploitation from other hackers or threat actors.

It is not clear at this time how the routers themselves were compromised, and though critical vulnerabilities have been identified in the past, recent firmware releases may have also contributed to the misconfigurations. In total, it is thought that the campaign may involve as many as 20,000 sender domains (web servers’ names). For scale, the Tor network uses around 8,000 relays making this botnet more than 1.5 times larger.

Infoblox threat researcher David Brunsdon said that “Together, they form a large cannon, poised and ready to unleash a barrage of malicious activities.” And the Infoblox report details that “Tens or hundreds of thousands of compromised machines use them for network access, significantly amplifying the potential scale and impact of the botnet’s operations.”

Similar botnets have participated in a wide range of malicious behavior including DDoS attacks, spam and phishing campaigns, credential stuffing attacks, data theft, cryptojacking, click fraud and more.

How to stay safe

Best antivirus software

(Image credit: Shutterstock)

Obviously the first step to staying safe is to make sure your router is properly configured, and kept up to date. If it's on the older side, you might be better off just upgrading to one of the best Wi-Fi routers as many newer devices ship with built-in security software.

Never open email attachments that you're not expecting or ones that come from a sender that you don't know. This also applies to links in emails too.

As an added step, make sure you have a strong, robust antivirus software installed on your home PC and laptop. It's never a bad idea to make sure that your antivirus suite includes a VPN and a hardened browser too.

More from Tom's Guide

Network
Arrow
Intego
Norton
Contract Length
Arrow
Showing 2 of 2 deals
Filters
Arrow
Amber Bouman
Senior Editor Security

Amber Bouman is the senior security editor at Tom's Guide where she writes about antivirus software, home security, identity theft and more. She has long had an interest in personal security, both online and off, and also has an appreciation for martial arts and edged weapons. With over two decades of experience working in tech journalism, Amber has written for a number of publications including PC World, Maximum PC, Tech Hive, and Engadget covering everything from smartphones to smart breast pumps. 

Read more
A person trying to set up a new Wi-Fi router
Thousands of TP-Link routers have been infected by a botnet to spread malware
Graphic of fibre optic cables attacking code
An estimated 46,000 VPN servers are vulnerable to being hijacked
An Android bot next to an Android TV remote
Millions of Android TVs hijacked in massive botnet — how to see if yours is at risk
Green skull on smartphone screen.
Over 1 million Android devices infected with password-stealing, pre-installed botnet malware — how to stay safe
A hacker typing quickly on a keyboard
Thousands of WordPress sites hijacked to spread Windows and Mac malware - how to stay safe
An image of a CAPTCHA
Hackers are using reCAPTCHA to trick users into infecting their own PCs with malware — how to stay safe
Latest in Online Security
A woman using her laptop securely with a cup of coffee in hand
5 common mistakes people make when shopping for antivirus software
Windows
240 million Windows 10 users are vulnerable to six different hacker exploits — protect yourself now
Victims of Identity Theft
FTC says Americans lost $12 billion to scams last year and these were the worst ones — here's how to stay safe
Apple iPhone 16 Plus Review.
Apple just released an emergency security update for a flaw used in an ‘extremely sophisticated attack’ — update your devices right now
A person trying to set up a new Wi-Fi router
Thousands of TP-Link routers have been infected by a botnet to spread malware
An image of a CAPTCHA
Hackers are using reCAPTCHA to trick users into infecting their own PCs with malware — how to stay safe
Latest in News
(L-R) Josh Hartnett as Cooper and Ariel Donoghue as Riley in "Trap"
Netflix top 10 movies — here’s the 3 worth watching right now
iOS 19 logo on an iPhone
Apple WWDC 2025: iOS 19 and everything we know so far
Siri
Siri 2.0 features reportedly only working ‘two-thirds to 80% of the time’
NYTimes Connections
NYT Connections today hints and answers — Sunday, March 16 (#644)
Nintendo Switch 2
New Nintendo Switch 2 FCC filing suggests this beloved Nintendo controller could make a comeback
(From L to R) Rohan (Nik Dodani), Josh (Brandon Flynn), Dorothy (Edie Falco), John (Dean Norris), and Liddie (Lisa Kuthrow) in The Parenting
Max top 10 movies — here’s the 3 worth watching right now