We had issues with the src address lists in the firewall letting through all traffic rather than only the traffic listed, so of course they blew right through a non-functional firewall.
They put two scripts in there, one was enabling ppoe out, the other was this.
When you go to this site it tries to infect your system right off. Looks like they’re trying to get a bunch of infected machines mining coins for them. Not sure what their intent is with Mikrotik hardware.
What I’m talking about is how we got hit with one.
Address lists are being ignored in the filter section of the firewall randomly.
We noticed it around 6.30 and it randomly pops up ever since. I had my DNS blocked to all but allowed address list of “DNS”. When I updated to 6.30 I had to change all of my rules as the DNS address list was ignored. The same was happening with my port 80 and winbox rules, only in reverse. Instead of only allowing my addresses it allowed all addresses and I didn’t catch it until we had already been hacked.
What I’m talking about is a system that was locked down to only allowed addresses through firewall filter rules. The address lists were ignored.
I had the same problem, winbox port blocked only for network provider, latest version and firmware, strong users and passwords, I noticed this on June 15 at 10pm.
If you didn’t change passwords after upgrading to fix the winbox exploit, this is likely how they are gaining access. Change all passwords, preferably after netinstall to ensure no remaining backdoors.
By Firewall Filter i did Log for the attacker src address , so when he attacks my host , Mikrotik Server logs his Src address and (a) src Mac-Address
The src mac address logged in my Server log not belong’s to me , That’s all buddy
I really wondering about possibility to be my ISP wan .. so i didn’t say that it’s attacker MAC , i just said it’s belong to RouterBoard.com
But i’m sure that it’s not my WAN interface MAC address
i checked out F5 Blog , and i found the same ip subnet of the attacker bottled in my dynamic address list
188.246.234.62 | in my dynamic address list
188.246.234.60 | in F5 article
Maybe they did it because of the Turkish elections cause My ISP Provider is Turktelecom
Also i attached all attackers ip-address who attacked my nine servers if u wanna block it in advance
Regard’s Attacker’s SRC.txt (26.8 KB)
MAC addresses work only at the broadcast domain level (layer 2). No MAC address is ever routed to another subnet. The MAC addresses on a frame are always updated by routers. So no, you do not have the MAC of your attacker. You have the MAC of the device in the broadcast domain that sent you the packet.