![]() Radware’s Emergency Response Team (ERT) has spotted an increase in malicious activity following Kaspersky’s publication about the Slingshot APT malware that infected Mikrotik routers. Such devices have been making unaccounted outbound winbox connections. MikroTik, a Latvian hardware manufacturer, products are used around the world and are now a target of a new propagating botnet exploiting vulnerabilities in their RouterOS operating system, allowing attackers to remotely execute code on the device. Download a Copy Now AbstractĪ newly discovered botnet targets TCP port 8291 and vulnerable Mikrotik RouterOS-based devices. ![]() A newly discovered botnet targets TCP port 8291 and vulnerable Mikrotik RouterOS-based devices.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |