Latvian network equipment manufacturer MikroTik has shared details on how customers can secure and clean routers compromised by the massive Mēris DDoS botnet over the summer.
“As far as we have seen, these attacks use the same routers that were compromised in 2018, when MikroTik RouterOS had a vulnerability, that was quickly patched,” a MicroTik spokesperson told BleepingComputer.
“Unfortunately, closing the vulnerability does not immediately protect these routers. If somebody got your password in 2018, just an upgrade will not help.
“You must also change password, re-check your firewall if it does not allow remote access to unknown parties, and look for scripts that you did not create.”
The Mēris botnet has been behind two record-breaking volumetric (aka application-layer) DDoS attacks this year.
The first one mitigated by Cloudflare in August reached 17.2 million request-per-second (RPS). The second one peaked at an unprecedented rate of 21.8 million RPS while hammering Russian internet giant Yandex servers earlier this month.
According to Qrator Labs researchers who provided details on the Yandex attack, Mēris — a botnet derived from Mirai malware code — is now controlling roughly 250,000 devices, most of them MikroTik network gateways and routers.
Also Read: The Role of A DPO During Work From Home
The researchers also added that the hosts compromised by Mēris are “not your typical IoT blinker connected to WiFi” but highly capable devices connected to the Intenet via an Ethernet connection.
Mēris’ history of attacks targeting Yandex’s network started in early August with a 5.2 million RPS DDpS attack and kept increasing in size:
MikroTik also shared info on how to clean and secure gateways compromised by this botnet in a blog post published today.
The network equipment vendor urges customers to choose strong passwords that should defend their devices from brute-force attacks and keep them up to date to block CVE-2018-14847 Winbox exploits likely used by the Mēris botnet according to MikroTik.
The company outlined the best course of action, which includes the following steps:
Settings the Mēris malware can set when reconfiguring compromised MicroTik routers include:
“We have tried to reach all users of RouterOS about this, but many of them have never been in contact with MikroTik and are not actively monitoring their devices. We are working on other solutions too,” MikroTik added.
Also Read: Top 3 Common Data Protection Mistakes, Revealed
“As far as we know right now – There are no new vulnerabilities in these devices. RouterOS has been recently independently audited by several contractors.”