MikroTik Official Response: Cisco informed us on May 22nd of 2018, that a malicious tool was found on several manufacturer devices, including three devices made by MikroTik. We are highly certain that this malware was installed on these devices through a vulnerability in MikroTik RouterOS software, which was already patched by MikroTik in March 2017. Simply upgrading RouterOS software deletes the malware, any other 3rd party files and closes the vulnerability. Let us know if you need more details. Upgrading RouterOS is done by a few clicks and takes only a minute.
https://forum.mikrotik.com/viewtopic.php?f=21&t=134776&p=663825#p663825 Dennis Burgess, MikroTik Certified Trainer -----Original Message----- From: NANOG <[email protected]> On Behalf Of Mark Tinka Sent: Thursday, May 24, 2018 3:44 AM To: [email protected]; [email protected] Subject: Re: BGP Battleships So the moral of the story is... "former Level(3)" must step into the bar and have a beer with the rest of us :-)? Mark. On 23/May/18 22:53, Scott Weeks wrote: > > I saw the below on SWINOG and thought it might add some fun in the > middle of all this General Data Protection Regulation conversation. :) > > scott > > > --- Begin forwarded message: > > From: Gregor Riepl <[email protected]> > To: [email protected] > Subject: [swinog] BGP Battleships > Date: Tue, 22 May 2018 23:18:51 +0200 > > Some good ol' fun with BGP: > > https://imsva91-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=http > s%3a%2f%2fblog.benjojo.co.uk%2fpost%2fbgp%2dbattleships&umid=11F39436- > 6CEF-A905-AF98-203A0AD563EA&auth=079c058f437b7c6303d36c6513e5e8848d0c5 > ac4-9d1558ea3856dddcaa08f2ee54a6060b4ee27e65 > > Please (don't?) try this at home! > > > > > . >

