MikroTik Official Response: 

Cisco informed us on May 22nd of 2018, that a malicious tool was found on 
several manufacturer devices, including three devices made by MikroTik. We are 
highly certain that this malware was installed on these devices through a 
vulnerability in MikroTik RouterOS software, which was already patched by 
MikroTik in March 2017. Simply upgrading RouterOS software deletes the malware, 
any other 3rd party files and closes the vulnerability. Let us know if you need 
more details. Upgrading RouterOS is done by a few clicks and takes only a 
minute.

https://forum.mikrotik.com/viewtopic.php?f=21&t=134776&p=663825#p663825

Dennis Burgess, MikroTik Certified Trainer

-----Original Message-----
From: NANOG <[email protected]> On Behalf Of Mark Tinka
Sent: Thursday, May 24, 2018 3:44 AM
To: [email protected]; [email protected]
Subject: Re: BGP Battleships

So the moral of the story is... "former Level(3)" must step into the bar and 
have a beer with the rest of us :-)?

Mark.

On 23/May/18 22:53, Scott Weeks wrote:
>
> I saw the below on SWINOG and thought it might add some fun in the 
> middle of all this General Data Protection Regulation conversation. :)
>
> scott
>
>
> --- Begin forwarded message:
>
> From: Gregor Riepl <[email protected]>
> To: [email protected]
> Subject: [swinog] BGP Battleships
> Date: Tue, 22 May 2018 23:18:51 +0200
>
> Some good ol' fun with BGP:
>
> https://imsva91-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=http
> s%3a%2f%2fblog.benjojo.co.uk%2fpost%2fbgp%2dbattleships&umid=11F39436-
> 6CEF-A905-AF98-203A0AD563EA&auth=079c058f437b7c6303d36c6513e5e8848d0c5
> ac4-9d1558ea3856dddcaa08f2ee54a6060b4ee27e65
>
> Please (don't?) try this at home!
>
>
>
>
> .
>

Reply via email to