

Use a strong password and even if you do, change it now!.Do not open access to your device from the internet side to everyone, if you need remote access, only open a secure VPN service, like IPsec.Keep your MikroTik device up to date with regular upgrades.The company outlined the best course of action, which includes the following steps: The network equipment vendor urges customers to choose strong passwords that should defend their devices from brute-force attacks and keep them up to date to block CVE-2018-14847 Winbox exploits likely used by the Mēris botnet according to MikroTik. MikroTik also shared info on how to clean and secure gateways compromised by this botnet in a blog post published today. How to secure and clean your MikroTik router Mēris' history of attacks targeting Yandex's network started in early August with a 5.2 million RPS DDpS attack and kept increasing in size: The researchers also added that the hosts compromised by Mēris are "not your typical IoT blinker connected to WiFi" but highly capable devices connected to the Intenet via an Ethernet connection.


The second one peaked at an unprecedented rate of 21.8 million RPS while hammering Russian internet giant Yandex servers earlier this month.Īccording to Qrator Labs researchers who provided details on the Yandex attack, Mēris - a botnet derived from Mirai malware code - is now controlling roughly 250,000 devices, most of them MikroTik network gateways and routers. The first one mitigated by Cloudflare in August reached 17.2 million request-per-second (RPS). The Mēris botnet has been behind two record-breaking volumetric (aka application-layer) DDoS attacks this year. "You must also change password, re-check your firewall if it does not allow remote access to unknown parties, and look for scripts that you did not create." IoT botnet on steroids If somebody got your password in 2018, just an upgrade will not help. "Unfortunately, closing the vulnerability does not immediately protect these routers. "As far as we have seen, these attacks use the same routers that were compromised in 2018, when MikroTik RouterOS had a vulnerability, that was quickly patched," a MicroTik spokesperson told BleepingComputer. Latvian network equipment manufacturer MikroTik has shared details on how customers can secure and clean routers compromised by the massive Mēris DDoS botnet over the summer.
