I have at least 1 router board that is sending out traffic even though nothing is connected to it. Most of the traffic source is port 1080 socks and many of the dest port is 25 smtp.
this is causing my network to be attacked from outside and I am geting a lot of email about abuse from outside people.
Evidence for what? That ROS can be infected or that it’s possible to run code from RAM?
Seriously normis, stop arguing that way, that’s highly unprofessional. Systems(regardless of the base OS) have been hijacked that way in the past, that’s nothing left for speculation.
However you are probably right in saying, that ROS hasn’t been hijacked yet, but that doesn’t guarantee a bit.
can you tell us more about what Mikrotik does to minimize the possibility that it executes malicious code?
i would also say that it’s unlikely that this happens, but to say it’s impossible is really unprofessional.
I’m working as a security analyst for some time and have seen some crazy of compromised systems.
There is no system in th world about you can say it’s 100% secure. Ok all systems can be 100% but you need to unplug the power cable to secure it
you can say there is no known vulnerability, the system have multiple layers to mitigate intrusions. but than tell us more about that.
what gcs is describing sound more like some “usual” infection used for sending spam and such stuff. If seen a lot of compromised linux based boxes in my life getting abused for such activity. But during forensics it usually turned out they got hacked via known and not patched vulnerabilities.
It’s unlikely that those bad guys spend a lot of time to find a vulnerability to compromise systems with the (spam)-bots especially if the possible count of targets is very low. they just interested in the count of infected hosts.
some questions at gcs
is really everything disconnected ?
it could be that you configured (by accident) a socks proxy which is open for the world?
are you running something inside metarouter what could be compromised?
at mirkrotik:
please don’t just say something stupid like “RouterOS can not be infected.” even if this is unlikely it’s worth to investigate so you should help the user to find the problem. if it’s just something like a open socksproxy we’re all happy. if there is really the unlikely case that someone have a 0day exploited for routeros and use it just to send spam you should be really interested in find it as soon as possible.